يعرض 361 - 380 نتائج من 545 نتيجة بحث عن '(( element method algorithm ) OR ((( data mining algorithm ) OR ( based data algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 361

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  2. 362

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 363
  4. 364

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…</p><h2>Other Information</h2> <p> Published in: BioData Mining<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1186/s13040-021-00237-y" target="_blank">http://dx.doi.org/10.1186/s13040-021-00237-y</a></p>…"
  5. 365

    Vibration suppression in a cantilever beam using a string-type vibration absorber حسب Issa, Jimmy S.

    منشور في 2017
    "…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 366

    Dataset built for Arabic Sentiment Analysis حسب AL MUKHAITI, AYESHA JUMAA SALEM

    منشور في 2016
    "…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
    احصل على النص الكامل
  7. 367

    Scatter search for homology modeling حسب Mansour, Nashat

    منشور في 2016
    "…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 368
  9. 369

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks حسب Artail, Hassan

    منشور في 2009
    "…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 370

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 371

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 372

    Shuffled Linear Regression with Erroneous Observations حسب Saab, Samer S.

    منشور في 2019
    "…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 373
  14. 374
  15. 375

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 376

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  17. 377

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  18. 378

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  19. 379

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review حسب Uzair Shah (15740699)

    منشور في 2022
    "…We carefully selected search terms based on target intervention (i.e., imagined speech and AI) and target data (EEG signals), and some of the search terms were derived from previous reviews. …"
  20. 380

    Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves حسب S. Andhale, Yogesh

    منشور في 2018
    "…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
    احصل على النص الكامل