يعرض 61 - 80 نتائج من 229 نتيجة بحث عن '(((( element data algorithm ) OR ( element encryption algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 61

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) حسب Wehbe, Gioia Wahib

    منشور في 2016
    "…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 62
  3. 63
  4. 64

    Integrated economic and environmental models for a multi stage cold supply chain under carbon tax regulation حسب Hariga, Moncer

    منشور في 2017
    "…The elevated level of public and organizations awareness concerning sustainability has necessitated the adoption of environmentally conscious practices in the management of supply chains. …"
    احصل على النص الكامل
    article
  5. 65

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars حسب Abathar Al-Hamrani (16494884)

    منشور في 2023
    "…However, FRP-reinforced concrete (RC) structures exhibit less ductile response compared to steel RC structures. Recently, the use of basalt fiber reinforced concrete (BFRC) reinforced with BFRP bars was investigated to achieve a reasonable level of ductility in BFRC-BFRP one-way slabs. …"
  6. 66

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72

    Simultaneous stabilisation of power systems using geneticalgorithms حسب Abdel-Magid, Y.L.

    منشور في 1997
    "…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 73

    A Survey of Data Clustering Techniques حسب Sobeh, Salma

    منشور في 2023
    "…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  14. 74

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …"
    احصل على النص الكامل
    article
  15. 75

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …"
    احصل على النص الكامل
  16. 76

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …"
  17. 77
  18. 78
  19. 79

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output حسب Kaif Ahmed Lodi (16855518)

    منشور في 2020
    "…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …"
  20. 80