يعرض 541 - 560 نتائج من 601 نتيجة بحث عن '(( element could algorithm ) OR ((( data based algorithm ) OR ( data processing algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 541
  2. 542

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2022
    "…A narrative approach was used for data synthesis.</p><h3>Results</h3><p dir="ltr">The search process returned 1470 records. …"
  3. 543

    Framework for rapid design and optimisation of immersive battery cooling system حسب Ali Almshahy (23544823)

    منشور في 2025
    "…A conjugate heat transfer model for a 3S2P pouch cell module (20 Ah LiFePO₄) is developed and validated against experimental data (< 2% error). The CFD model of a battery module is developed to train an ultra-fast metamodel for battery geometry optimisation. …"
  4. 544
  5. 545

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? حسب Raymon van Dinter (10521952)

    منشور في 2023
    "…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …"
  6. 546

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort حسب Sergio Márquez-Sánchez (19437985)

    منشور في 2023
    "…Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …"
  7. 547
  8. 548

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  9. 549

    Combinatorial method for bandwidth selection in wind speed kernel density estimation حسب El Dakkak, Omar

    منشور في 2019
    "…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …"
    احصل على النص الكامل
  10. 550

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …"
  11. 551

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 552
  13. 553

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework حسب Jayakanth Kunhoth (14158908)

    منشور في 2024
    "…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …"
  14. 554

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 555
  16. 556
  17. 557

    An efficient cache replacement strategy for the hybrid cache consistency approach حسب Haraty, Ramzi A.

    منشور في 2010
    "…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 558

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. …"
  19. 559

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images حسب Rehan Raza (17019105)

    منشور في 2023
    "…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"
  20. 560

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article