يعرض 641 - 660 نتائج من 764 نتيجة بحث عن '(( data learning algorithm ) OR ((( develop a algorithm ) OR ( element data algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 641

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…Diverse dataset curation, bias mitigation strategies, continuous validation across populations, and collaborative efforts for regulatory approval are essential for the successful deployment of AI ECG in clinical settings and must be undertaken to address these issues. To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"
  2. 642
  3. 643

    Thermal convection of fluid in fractured media حسب Sfeir, Abdallah

    منشور في 1995
    "…Including this phenomenon in a modelling process led us to propose a development of the UDEC code. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 644

    General Inspection Plan For Critical Multicharacteristic Components حسب Duffuaa, S. O.

    منشور في 2020
    "…A decent type algorithm is proposed to determine the optimal number of repeat inspections and sequence characteristics for inspection that minimizes the expected total cost. …"
    احصل على النص الكامل
    article
  5. 645

    An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications حسب Ouaiss, I.

    منشور في 2017
    "…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 646

    Computer-aided detection of Melanoma using geometric features حسب Azar, Danielle

    منشور في 2017
    "…In this work, we investigate the use of geometric features to differentiate between a benign lesion and a malignant one. The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 647
  8. 648

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…This approach is based on maintaining and evolving a population of solutions. We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 649

    Predicting stability of classes in an object-oriented system حسب Azar, D.

    منشور في 2010
    "…The stability of a class in object-oriented system is one software quality characteristic that is important to assess at the early development stages. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 650

    Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection حسب Ahmad Yaser Alhaddad (7017434)

    منشور في 2022
    "…</p><h2>Other Information</h2><p dir="ltr">Published in: Frontiers in Bioengineering and Biotechnology<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3389/fbioe.2022.876672" target="_blank">https://dx.doi.org/10.3389/fbioe.2022.876672</a></p>…"
  11. 651

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. …"
  12. 652

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection حسب Abu Zitar, Raed

    منشور في 2022
    "…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
  13. 653

    On the Generation of Quantified Lemmas حسب Gabriel Ebner (23277217)

    منشور في 2018
    "…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …"
  14. 654
  15. 655

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 656

    Digital Image Watermarking Using Balanced Multiwavelets حسب Ghouti, L.

    منشور في 2006
    "…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
    احصل على النص الكامل
    article
  17. 657

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…This paper reports on an innovative and comprehensive method proposed for the quality control of drilled shafts that overcomes several limitations of conventional methods. The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 658

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 659

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…The purpose of this study is to develop a data mining approach for predicting student's selection of program majors. …"
    احصل على النص الكامل
  20. 660