يعرض 381 - 400 نتائج من 418 نتيجة بحث عن '(((( implementing a algorithm ) OR ( elements cc3d algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 381
  2. 382
  3. 383

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…However, they are not highly effective in improving results and are frequently employed by doctors for cancer diagnosis. This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  4. 384

    Exploring AI Conversational Chatbot UX Design: Insights from High School حسب Suha Khalil Assayed

    منشور في 2025
    "…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …"
    احصل على النص الكامل
  5. 385

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  6. 386
  7. 387
  8. 388

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. …"
    احصل على النص الكامل
  9. 389

    Cooperative Caching Policy in Fog Computing for Connected Vehicles حسب Ghazleh, Ali

    منشور في 2023
    "…In this thesis, we implemented cooperation between a Deep Reinforcement Learning (DRL) model and Federated Learning to improve caching in Connected Vehicles connected to fog nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 390

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque, Ahmed

    منشور في 2023
    "…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 391

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  12. 392

    Using C++ to Calculate SO(10) Tensor Couplings حسب Bhagwagar, Azadan

    منشور في 2021
    "…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. …"
    احصل على النص الكامل
    article
  13. 393

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle حسب Reza Jafari (3494018)

    منشور في 2025
    "…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …"
  14. 394

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …"
  15. 395
  16. 396

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…To achieve this goal, we present a formal specification for GIMPLE weaving and the implementation strategies of the proposed weaving semantics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 397

    FPGA-Based Network Traffic Classification Using Machine Learning حسب Elnawawy, Mohammed

    منشور في 2020
    "…The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …"
    احصل على النص الكامل
    article
  18. 398

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques حسب Arifa Zahir (20748764)

    منشور في 2024
    "…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …"
  19. 399

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…It had an impressive accuracy of 99.99%, and it could mitigate DDoS attacks in less than 3 s. We conducted a comparative analysis of various models and algorithms used in the related works. …"
  20. 400

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque Ahmed (16517712)

    منشور في 2023
    "…For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …"