بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
يعرض 161 - 180 نتائج من 211 نتيجة بحث عن '(( based making algorithm ) OR ((( elements study algorithm ) OR ( elements method algorithm ))))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 161

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 162

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  3. 163

    Using machine learning to support students’ academic decisions حسب ALLAH, AISHA QASIM GHAZAL FATEH

    منشور في 2019
    "…This approach uses other students’ grades to make a prediction. This research tests and compares the performance of Decision Trees, Random Forests, Gradient-Boosted trees, and Deep Learning machine learning regression algorithms to predict student GPA. …"
    احصل على النص الكامل
  4. 164
  5. 165

    Inception voltage of corona in bipolar ionized fields-effect oncorona power loss حسب Al-Hamouz, Z.

    منشور في 1996
    "…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 166

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 167

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier حسب JAIN, SWETA

    منشور في 2023
    "…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …"
    احصل على النص الكامل
    احصل على النص الكامل
  8. 168

    Random vector functional link network: Recent developments, applications, and future directions حسب A.K. Malik (16003193)

    منشور في 2023
    "…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …"
  9. 169

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 170

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …"
  11. 171

    Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks حسب Islambouli, Rania

    منشور في 2019
    "…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 172
  13. 173

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …"
  14. 174

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …"
  15. 175

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …"
  16. 176
  17. 177
  18. 178
  19. 179

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
  20. 180

    Fine-grain watermarking for intellectual property protection حسب Stefano Giovanni Rizzo (18615112)

    منشور في 2019
    "…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …"