يعرض 121 - 140 نتائج من 169 نتيجة بحث عن '(((( elements method algorithm ) OR ( process making algorithm ))) OR ( neural coding algorithm ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 121

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  2. 122

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…This provides exact endotoxin classification and has tremendous potential for accelerated medical diagnostics and treatment decision-making in cases of pathogenic infections. BackgroundBacterial endotoxin, a lipopolysaccharide exuded by bacteria during their growth and infection process, serves as a valuable biomarker for bacterial identification. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 123

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 124
  5. 125

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…This paper aims to introduce a novel approach to addressing current security challenges by utilizing our generalized Collatz process to create a chaos-based hash function. By leveraging the unpredictable behaviour of the Collatz sequence, the proposed hash function aims to enhance ergodicity and entropy properties, thereby making it well-suited for cryptographic applications. …"
  6. 126

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks حسب Abbas, Nadine

    منشور في 2015
    "…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 127

    A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs حسب Alabd-Aljabar, Ahmed

    منشور في 2024
    "…The rise in the emphasis on oral diseases has elevated the need to automate the diagnostic process of such diseases. Fortunately, the availability of modern computing devices has made the automated diagnosis of teeth readily possible using deep learning. …"
    احصل على النص الكامل
    article
  8. 128
  9. 129

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
  10. 130

    Vibration suppression in a cantilever beam using a string-type vibration absorber حسب Issa, Jimmy S.

    منشور في 2017
    "…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 131

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Steganography is the process of obfuscation that makes something incomprehensible and unclear. …"
  12. 132

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…Simulation results reveal that our solution outperforms the two common scheduling algorithms (i.e., Min-Min and Max-Min) in terms of IoT services execution makespan, fog nodes resource utilization efficiency and execution time.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 133
  14. 134

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…Several software metrics have been proposed in the literature to avoid this long and costly process, and they proved to be a good means of estimating software quality. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 135

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …"
  16. 136

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform حسب Hamed Al-Shaibani (19497412)

    منشور في 2022
    "…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …"
  17. 137
  18. 138
  19. 139

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …"
  20. 140