يعرض 41 - 60 نتائج من 181 نتيجة بحث عن '(((( image sampling algorithm ) OR ( data making algorithm ))) OR ( element data algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 41

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data حسب Harazaki, Manami

    منشور في 2012
    "…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 42

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
    احصل على النص الكامل
    احصل على النص الكامل
  3. 43
  4. 44

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks حسب Ebrahimi, Dariush

    منشور في 2018
    "…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 45

    Automatic keyword extraction from a real estate classifieds data set حسب Devassy, Dibin

    منشور في 2011
    "…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …"
    احصل على النص الكامل
  6. 46

    A data envelopment analysis model for opinion leaders’ identification in social networks حسب Hamed Baziyad (19273738)

    منشور في 2024
    "…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
  7. 47

    Practical single node failure recovery using fractional repetition codes in data centers حسب Itani, May

    منشور في 2016
    "…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 48

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands حسب Peng, Wang

    منشور في 2020
    "…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 49

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review حسب Hiba Alzoubi (18001609)

    منشور في 2025
    "…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …"
  10. 50
  11. 51

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 52

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization حسب Chintalapani, Gouthami

    منشور في 2016
    "…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 53

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights حسب Malekloo, Arman

    منشور في 2021
    "…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …"
    احصل على النص الكامل
    article
  14. 54
  15. 55

    FarmTech: Regulating the use of digital technologies in the agricultural sector حسب Imad Antoine Ibrahim (14158998)

    منشور في 2023
    "…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …"
  16. 56

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …"
  17. 57

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  18. 58

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform حسب Hamed Al-Shaibani (19497412)

    منشور في 2022
    "…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …"
  19. 59

    Sentiment analysis for Arabizi in social media. (c2015) حسب Tobaili, Taha

    منشور في 2015
    "…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 60

    Large-scale annotation dataset for fetal head biometry in ultrasound images حسب Mahmood Alzubaidi (15740693)

    منشور في 2023
    "…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…"