يعرض 161 - 180 نتائج من 201 نتيجة بحث عن '(((( relevant data algorithm ) OR ( experiments based algorithm ))) OR ( neural coding algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 161

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  2. 162

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images حسب Rehan Raza (17019105)

    منشور في 2023
    "…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …"
  3. 163

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring حسب Muhammad E.H. Chowdhury (17151154)

    منشور في 2019
    "…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…"
  4. 164

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  5. 165

    Diagnosing failed distribution transformers using neural networks حسب Farag, A.S.

    منشور في 2001
    "…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. The diagnosis was based on the latest standards and expert experiences in this field. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 166

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai حسب Hamadeh, Moutaz Wajih

    منشور في 2015
    "…In the end, an experiment was conducted over datasets collected from different timeframes to see what are the constant hot topics discussed in Twitter about Dubai. …"
    احصل على النص الكامل
  7. 167

    SemIndex: Semantic-Aware Inverted Index حسب Chbeir, Richard

    منشور في 2017
    "…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 168
  9. 169

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test حسب Hasan T. Abbas (8115014)

    منشور في 2019
    "…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …"
  10. 170

    Cyberbullying Detection Model for Arabic Text Using Deep Learning حسب Albayari, Reem

    منشور في 2023
    "…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
    احصل على النص الكامل
    احصل على النص الكامل
  11. 171

    Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper حسب Mutaz I. Othman (21186827)

    منشور في 2025
    "…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…"
  12. 172

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  13. 173

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 174

    Internal Model Control Structure Using Adaptive Inverse Control Strategy حسب Shafiq, M.Riyaz

    منشور في 2003
    "…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 175
  16. 176
  17. 177

    Novel biomarkers for potential risk stratification of drug induced liver injury (DILI) حسب Mohammed Ibn-Mas’ud Danjuma (13192169)

    منشور في 2019
    "…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …"
  18. 178

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…We implemented a prototype and conducted several experiments on large sets of real and synthetic XML documents and grammars. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 179

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل
  20. 180

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
    احصل على النص الكامل