Search alternatives:
processing algorithm » processing algorithms (Expand Search)
learning algorithm » learning algorithms (Expand Search)
query processing » text processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 121 - 140 results of 228 for search '(( element data algorithm ) OR ((( query processing algorithm ) OR ( deep learning algorithm ))))', query time: 0.13s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124
  5. 125

    MSD-NAS: multi-scale dense neural architecture search for real-time pedestrian lane detection by Sui Paul Ang (18460605)

    Published 2023
    “…<p dir="ltr">Accurate detection of pedestrian lanes is a crucial criterion for vision-impaired people to navigate freely and safely. The current deep learning methods have achieved reasonable accuracy at this task. …”
  6. 126
  7. 127

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  8. 128

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 129

    DAP: A dataset-agnostic predictor of neural network performance by Sui Paul Ang (18460605)

    Published 2024
    “…This task often must be repeated many times, especially when developing a new deep learning algorithm or performing a neural architecture search. …”
  10. 130
  11. 131
  12. 132
  13. 133
  14. 134
  15. 135

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam (22304047)

    Published 2025
    “…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
  16. 136

    Distributed DRL-Based Downlink Power Allocation for Hybrid RF/VLC Networks by Bekir Sait Ciftler (17541801)

    Published 2021
    “…We implement a simulation environment to benchmark the proposed distributed DRL-based method against other methods such as Q-Learning (QL) and Deep Q-Networks (DQN), and centralized heuristic power allocation algorithms. …”
  17. 137

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  18. 138

    DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs by Bahareh Jafari (22501715)

    Published 2025
    “…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …”
  19. 139

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 140