يعرض 21 - 40 نتائج من 91 نتيجة بحث عن '(( element mean algorithm ) OR ((( data code algorithm ) OR ( data lacking algorithm ))))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 21

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …"
  2. 22
  3. 23
  4. 24

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 25
  6. 26

    An ant colony optimization algorithm to improve software quality prediction models حسب Azar, D.

    منشور في 2011
    "…However, building accurate prediction models is hard due to the lack of data in the domain of software engineering. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 27
  8. 28
  9. 29

    Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks حسب Yaacoub, Elias

    منشور في 2013
    "…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 30

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study حسب Alkhodari, Mohanad Ahmed

    منشور في 2021
    "…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
    احصل على النص الكامل
    article
  11. 31

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…While estrogen receptor positive (ER+), progesterone receptor positive (PR+), and human epidermal growth factor receptor positive (HER2+) subtypes are easily classified and can be targeted, there remains no direct diagnostic test for triple-negative breast cancer (TNBC), except for the lack of receptors expression. The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …"
  12. 32

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
    احصل على النص الكامل
  13. 33
  14. 34

    Sentiment analysis for Arabizi in social media. (c2015) حسب Tobaili, Taha

    منشور في 2015
    "…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 35

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
  16. 36

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 37

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
  18. 38
  19. 39

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
  20. 40