Showing 301 - 312 results of 312 for search '(((( implement modeling algorithm ) OR ( movement data algorithm ))) OR ( data making algorithm ))', query time: 0.10s Refine Results
  1. 301

    Using C++ to Calculate SO(10) Tensor Couplings by Bhagwagar, Azadan

    Published 2021
    “…Model building in SO(10), which is the leading grand unification framework, often involves large Higgs representations and their couplings. …”
    Get full text
    article
  2. 302

    Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine by Majd A. AbuAlrob (22392505)

    Published 2025
    “…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …”
  3. 303

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  4. 304

    Exploring AI Conversational Chatbot UX Design: Insights from High School by Suha Khalil Assayed

    Published 2025
    “…Advancements in state-of-the-art models and algorithms for chatbots have significantly driven the growth and evolution of human–computer interaction (HCI) in recent years. …”
    Get full text
  5. 305

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 306

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    article
  7. 307
  8. 308
  9. 309
  10. 310

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  11. 311

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  12. 312

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”