بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 661 - 680 نتائج من 689 نتيجة بحث عن '(( element method algorithm ) OR ((( based learning algorithms ) OR ( based method algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 661

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  2. 662
  3. 663
  4. 664

    MoveSchedule حسب Zouein, Pierette

    منشور في 1995
    "…The resource levels describe different methods or crew-sizes for performing the activity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 665

    SDODV. (c2018) حسب Assi, Maram

    منشور في 2018
    "…It monitors the traffic load, nodes mobility, neighborhood density and battery power to adjust the routing of packets accordingly. This protocol is based on the distributed reinforcement learning approach and on the traditional AODV. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  6. 666

    Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier حسب Yassine Himeur (14158821)

    منشور في 2021
    "…Furthermore, an improved k-nearest neighbors (IKNN) algorithm is presented to reduce the learning computation time and improve the classification performance. …"
  7. 667
  8. 668

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE حسب SHWEDEH, FATEN

    منشور في 2018
    "…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
    احصل على النص الكامل
  9. 669

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test حسب Hasan T. Abbas (8115014)

    منشور في 2019
    "…Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. All possible combinations of the 10 best ranked features were used to generate SVM based prediction models. …"
  10. 670

    Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics حسب Sait, Sadiq M.

    منشور في 2020
    "…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …"
    احصل على النص الكامل
    article
  11. 671

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer حسب Andrea Remo (447375)

    منشور في 2015
    "…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
  12. 672

    The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias حسب King, Gretchen

    منشور في 2026
    "…A theoretical framework for analysing digital Orientalism is advanced through a historicisation of media imperialism, the military–industrial–communications complex and the political economy of AI in occupied Palestine. Grounded in research-based teaching methods, and employing a mixed-method content and frequency analysis and comparison of ChatGPT outputs in English and Arabic, this article expands research on AI biases, algorithmic oppression and digital divides within the context of digital Orientalism and anti-Palestinianism. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 673

    Comparative assessment of fracture risk among osteoporosis and osteopenia patients: a cross-sectional study حسب Snezana Tomasevic-Todorovic (5782682)

    منشور في 2018
    "…The assessment of the fracture risk was executed by applying the Fracture Assessment Risk (FRAX) index (an algorithm developed by the World Health Organization) based on clinical fracture risks or combination of clinical fracture risks and bone mineral density.…"
  14. 674

    Investigation of Forming a Framework to shortlist contractors in the tendering phase حسب DABASH, MOHANNAD SALAH

    منشور في 2022
    "…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
    احصل على النص الكامل
  15. 675

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…Different statistical methods were considered in evaluating the simulated results.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 676

    ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints حسب Mohammed Al Disi (16855407)

    منشور في 2018
    "…Compressive sensing (CS) has been explored as a method to extend the battery lifetime of medical wearable devices. …"
  17. 677

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 678
  19. 679

    Crown Structures for Vertex Cover Kernelization حسب Abu-Khzam, Faisal N.

    منشور في 2007
    "…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. Two vertex cover kernelization methods are discussed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 680

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل