يعرض 261 - 280 نتائج من 431 نتيجة بحث عن '(((( implement based algorithm ) OR ( elements deer algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 261

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …"
    احصل على النص الكامل
  2. 262

    Exploring the System Dynamics of Covid-19 in Emergency Medical Services حسب Ali, Muhammad

    منشور في 2022
    "…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  3. 263
  4. 264

    Comparative Study on Arabic Text Classification: Challenges and Opportunities حسب Abualigah, Laith

    منشور في 2022
    "…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…"
    احصل على النص الكامل
  5. 265
  6. 266

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 267

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 268

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  9. 269

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data حسب Harazaki, Manami

    منشور في 2012
    "…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 270
  11. 271
  12. 272

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …"
    احصل على النص الكامل
  13. 273

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort حسب Mohamed Adil Shah Khoodoruth (14589828)

    منشور في 2024
    "…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …"
  14. 274
  15. 275

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
  16. 276

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …"
  17. 277
  18. 278
  19. 279

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 280

    Efficient unified Montgomery inversion with multi-bit shifting حسب Savas, Erkay

    منشور في 2005
    "…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article