يعرض 121 - 140 نتائج من 140 نتيجة بحث عن '(((( elements method algorithm ) OR ( develop search algorithm ))) OR ( neural coding algorithm ))*', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 121
  2. 122

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  3. 123

    Parallelization of Iterative Heuristic for Performance-Driven Low-Power VLSI Standard Cell Placement. حسب Syed, Sanaullah/SS

    منشور في 2003
    "…The motivation for Parallel CAD include faster runtimes, handling of larger problem sizes, and exploration of larger search space. In this work, the development of parallel algorithms for Tabu Search, applied on multi-objective VLSI cell-placement problem is presented. …"
    احصل على النص الكامل
    masterThesis
  4. 124

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  5. 125

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain حسب Ghulam Mustafa (458105)

    منشور في 2024
    "…To perform the experiment, we focused on the field of mathematics and used a dataset containing 525 individuals who received awards and 525 individuals who did not receive awards. The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
  6. 126

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 127

    Vibration suppression in a cantilever beam using a string-type vibration absorber حسب Issa, Jimmy S.

    منشور في 2017
    "…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 128

    Parallelization of Stochastic Evolution حسب Khan, Khawar

    منشور في 2006
    "…The motivation for Parallel CAD include faster runtimes, handling of larger problem sizes, and exploration of larger search space. In this work, the development of parallel algorithms for Stochastic Evolution, applied on multi-objective VLSI cell-placement problem is presented. …"
    احصل على النص الكامل
    masterThesis
  9. 129

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  10. 130

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
  11. 131
  12. 132

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…<p>Code completion serves as a fundamental aspect of modern software development, improving developers' coding processes. …"
  13. 133

    Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges حسب Muhammad Mohsin Khan (22303366)

    منشور في 2025
    "…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …"
  14. 134

    Artificial intelligence-based methods for fusion of electronic health records and imaging data حسب Farida Mohsen (16994682)

    منشور في 2022
    "…More specifically, we focus on studies that only fused EHR with medical imaging data to develop various AI methods for clinical applications. …"
  15. 135

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review حسب Hiba Alzoubi (18001609)

    منشور في 2025
    "…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …"
  16. 136

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  17. 137

    Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2023
    "…The most commonly used algorithm was random forest, followed by support vector machine.…"
  18. 138
  19. 139
  20. 140

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …"