يعرض 681 - 700 نتائج من 1,014 نتيجة بحث عن '(((( developing a algorithm ) OR ( elements data algorithm ))) OR ( data using algorithm ))*', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 681
  2. 682
  3. 683

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) حسب Stamboulian, Mouses Hrag

    منشور في 2015
    "…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 684

    MoveSchedule حسب Zouein, Pierette

    منشور في 1995
    "…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 685

    Inferential sensing techniques in industrial applications حسب Shakil,, Muhammad

    منشور في 0007
    "…Different types of dynamical neural networks are combined according to system operation and emission behavior. Real data from a boiler plant is used to develop the model. …"
    احصل على النص الكامل
    masterThesis
  6. 686

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  7. 687

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization حسب Majdi Mansouri (16869885)

    منشور في 2022
    "…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
  8. 688

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  9. 689
  10. 690

    A forward-backward Kalman for the estimation of time-variant channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 2005
    "…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 691

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2022
    "…Three reviewers independently extracted data from the included studies. A narrative approach was used for data synthesis.…"
  12. 692

    Shuffled Linear Regression with Erroneous Observations حسب Saab, Samer S.

    منشور في 2019
    "…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 693

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  14. 694

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
    احصل على النص الكامل
  15. 695

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 0000
    "…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 696

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 697
  18. 698

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 699

    Starvation Problem in CPU Scheduling for Multimedia Systems حسب Salah, Khaled

    منشور في 2002
    "…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
    احصل على النص الكامل
    article
  20. 700

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…The security of the proposed designs is formally verified using a random oracle model (ROM), a real-or-random (ROR) model, and by informally using pragmatic illustration and mathematical lemmas. …"