يعرض 401 - 420 نتائج من 431 نتيجة بحث عن '(((( implement based algorithm ) OR ( elements uce algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 401

    Condenser capacity and hyperbolic perimeterImage 1 حسب Mohamed M.S., Nasser

    منشور في 2021
    "…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 402

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  3. 403

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…Qualitative data was gathered from information found in relatively similar studies and from a real estate company in Dubai that allowed this study to be conducted on its databases with the help of its management and staff through interview, discussions, and direct implementations of the tools for testing. The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …"
    احصل على النص الكامل
  4. 404

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions حسب Sahlan, Monireh Nosrati

    منشور في 2021
    "…To demonstrate the validity and applicability of the presented method, we offer five significant examples, including generalized Cattaneo diffusion wave and Klein–Gordon equations. The implementation of algorithms exposes high accuracy of the presented numerical method. …"
    احصل على النص الكامل
    article
  5. 405

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  6. 406

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  7. 407

    An efficient cache replacement strategy for the hybrid cache consistency approach حسب Haraty, Ramzi A.

    منشور في 2010
    "…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 408
  9. 409

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling حسب Majed Hadid (17148364)

    منشور في 2022
    "…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …"
  10. 410

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque, Ahmed

    منشور في 2023
    "…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 411

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…The proposed techniques are based on statistical methods considering data compactness and other properties. …"
  12. 412

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque Ahmed (16517712)

    منشور في 2023
    "…For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …"
  13. 413

    Enhancing e-learning through AI: advanced techniques for optimizing student performance حسب Rund Mahafdah (21399854)

    منشور في 2024
    "…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …"
  14. 414

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features حسب Mariam Bahameish (19255789)

    منشور في 2024
    "…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …"
  15. 415

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
    احصل على النص الكامل
    masterThesis
  16. 416

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 417

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  18. 418

    Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…"
  19. 419
  20. 420

    ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints حسب Mohammed Al Disi (16855407)

    منشور في 2018
    "…<p dir="ltr">Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to cloud computing. …"