يعرض 121 - 140 نتائج من 157 نتيجة بحث عن '(( element method algorithm ) OR ((( data code algorithm ) OR ( case machine algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 121

    Vibration suppression in a cantilever beam using a string-type vibration absorber حسب Issa, Jimmy S.

    منشور في 2017
    "…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 122

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 123

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks حسب Muhammed Al-Ali (16810677)

    منشور في 2023
    "…<p dir="ltr">5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB), and massive Machine Type Communication (mMTC). 6G is required to support even more challenging scenarios, including the presence of a large number of uRLLC devices, under the massive uRLLC (mURLLC) use case scenario. …"
  4. 124

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  5. 125

    Hybrid Deep Learning-based Models for Crop Yield Prediction حسب Alexandros Oikonomidis (12050497)

    منشور في 2022
    "…The algorithms evaluated in our study are the XGBoost machine learning (ML) algorithm, Convolutional Neural Networks (CNN)-Deep Neural Networks (DNN), CNN-XGBoost, CNN-Recurrent Neural Networks (RNN), and CNN-Long Short Term Memory (LSTM). …"
  6. 126

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
  7. 127

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem حسب Habchi, Wassim

    منشور في 2008
    "…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 128

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
  9. 129

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) حسب Elaine Beller (44602)

    منشور في 2018
    "…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
  10. 130

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 131

    Predicting stability of classes in an object-oriented system حسب Azar, D.

    منشور في 2010
    "…We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 132

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 133

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  14. 134

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…Results show that, in most cases, our proposed technique out-performs the others in different aspects.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 135

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers حسب Yousef, Hibba

    منشور في 2024
    "…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
    احصل على النص الكامل
  16. 136

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  17. 137

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  18. 138

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning حسب ALFALASI, FARIS Jr

    منشور في 2023
    "…A sizable dataset of electronic text data was gathered from multiple social media platforms like Twitter, Instagram, YouTube, and many more sites in order to examine cyberbullying in social media using machine learning and deep learning techniques. The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
    احصل على النص الكامل
  19. 139
  20. 140

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …"
    احصل على النص الكامل