يعرض 781 - 800 نتائج من 805 نتيجة بحث عن '(( element method algorithm ) OR ((( data models algorithm ) OR ( based optimization algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 781

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  2. 782

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review حسب Arfan Ahmed (17541309)

    منشور في 2022
    "…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
  3. 783
  4. 784
  5. 785

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic حسب Saeed Al-Maroof, Rana

    منشور في 2020
    "…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
  6. 786

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 787

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
  8. 788

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity حسب Sweidan, Zahraa

    منشور في 2020
    "…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 789

    Tuning of a fuzzy logic power system stabilizer using geneticalgorithms حسب Abido, M.A.

    منشور في 1997
    "…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 790

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…Subsequently, state-of-the-art research that envisions the use of clustering-based machine learning and deep learning-based solutions for PGP is presented. …"
  11. 791

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 792
  13. 793

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 794

    Towards Multimedia Fragmentation حسب Saad, Samir

    منشور في 2006
    "…We particularly discuss multimedia primary horizontal fragmentation and provide a partitioning strategy based on low-level multi-media features. Our approach particularly emphasizes the importance of multimedia predicates implications in optimizing multimedia fragments. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 795

    Predicting Android Malware Using Evolution Networks حسب Chahine, Joy

    منشور في 2025
    "…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 796

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE حسب Ben Romdhane, Haifa

    منشور في 2023
    "…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …"
    احصل على النص الكامل
  17. 797

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques حسب SALLOUM, SAID

    منشور في 2022
    "…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
    احصل على النص الكامل
    احصل على النص الكامل
  18. 798
  19. 799
  20. 800

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey حسب Noorizadeh, Mohammad

    منشور في 2025
    "…Additionally, it emphasized the necessity for further research to optimize their performance and clinical usefulness.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article