Showing 641 - 660 results of 745 for search '(((( element data algorithm ) OR ( models using algorithm ))) OR ( neural coding algorithm ))', query time: 0.12s Refine Results
  1. 641

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …”
  2. 642

    Control of cardiac alternans by mechanical and electrical feedback by Yapari, Felicia

    Published 2014
    “…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …”
    Get full text
    article
  3. 643

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization by De Rochechouart, Maxence

    Published 2023
    “…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
    Get full text
  4. 644
  5. 645

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose by Atiq Ur Rehman (8843024)

    Published 2020
    “…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
  6. 646

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 647

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 648
  9. 649

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 650
  11. 651
  12. 652
  13. 653

    A machine learning approach for localization in cellular environments by Abdallah, Ali A.

    Published 2018
    “…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 654
  15. 655

    The architecture of a highly reconfigurable RISC dataflow array processor by Sait, Sadiq M.

    Published 2020
    “…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …”
    Get full text
    article
  16. 656
  17. 657

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2023
    “…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…”
  18. 658

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
  19. 659

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
    Get full text
    Get full text
    Get full text
    article
  20. 660

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”