يعرض 181 - 200 نتائج من 220 نتيجة بحث عن '(((( image processing algorithm ) OR ( data existing algorithm ))) OR ( element data algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 181

    ISSP حسب Zouein, P.P.

    منشور في 2017
    "…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 182

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance حسب Amr Zeedan (17983750)

    منشور في 2023
    "…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …"
  3. 183

    Towards Multimedia Fragmentation حسب Saad, Samir

    منشور في 2006
    "…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 184
  5. 185

    Next-generation energy systems for sustainable smart cities: Roles of transfer learning حسب Yassine Himeur (14158821)

    منشور في 2022
    "…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …"
  6. 186
  7. 187

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis حسب Alaa Abd-Alrazaq (17430900)

    منشور في 2021
    "…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…"
  8. 188

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier حسب Syed Ali Jafar Zaidi (19563178)

    منشور في 2021
    "…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
  9. 189

    Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization حسب Yassine Himeur (14158821)

    منشور في 2023
    "…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …"
  10. 190

    A survey and comparison of wormhole routing techniques in a meshnetworks حسب Al-Tawil, K.M.

    منشور في 1997
    "…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 191

    Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models حسب AL SHAMSI, ARWA AHMED

    منشور في 2023
    "…The study of thoughts, feelings, judgments, values, attitudes, and emotions regarding goods, services, organizations, persons, tasks, occasions, titles, and their attributes is known as sentiment analysis and it involves a polarity classification task for recognizing positive, negative, or neutral text to quantify what individuals believe using textual qualitative data. The rise of social media platforms provided an excellent source for sentiment analysis data. …"
    احصل على النص الكامل
  12. 192

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …"
  13. 193

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 194

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education حسب Abu Zitar, Raed

    منشور في 2022
    "…Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …"
    احصل على النص الكامل
  15. 195

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care حسب Regina Padmanabhan (14231606)

    منشور في 2022
    "…The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …"
  16. 196
  17. 197

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care حسب Barry Solaiman (19160614)

    منشور في 2024
    "…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …"
  18. 198
  19. 199
  20. 200

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
    احصل على النص الكامل