يعرض 661 - 680 نتائج من 728 نتيجة بحث عن '(( element method algorithm ) OR ((( data processing algorithm ) OR ( based methods algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 661

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 662
  3. 663

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting حسب Abdelkader Baggag (16864140)

    منشور في 2019
    "…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …"
  4. 664

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques حسب SALLOUM, SAID

    منشور في 2022
    "…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
    احصل على النص الكامل
    احصل على النص الكامل
  5. 665

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey حسب Noorizadeh, Mohammad

    منشور في 2025
    "…These VOCs can aid in the diagnosis of lung pathologies such as pneumonia. The CV processing method involves the application of advanced imaging techniques and machine learning algorithms to scrutinize and diagnose lung pathologies and ventilator-associated pneumonia (VAP). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 666

    An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks حسب Mohammad Zain Ul Abideen (16904637)

    منشور في 2022
    "…These algorithms calculate the optimal HC based on six scenarios of annual load and DER generation profiles. …"
  7. 667

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks حسب Mohammed Almehdhar (22046597)

    منشور في 2024
    "…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. …"
  8. 668

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions حسب Sahlan, Monireh Nosrati

    منشور في 2021
    "…The implementation of algorithms exposes high accuracy of the presented numerical method. …"
    احصل على النص الكامل
    article
  9. 669

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants حسب Mohannad N. Khandakji (13885434)

    منشور في 2022
    "…Local, gene-specific information have been shown to aid variant pathogenicity prediction; therefore, our aim was to develop a BRCA2-specific machine learning model to predict pathogenicity of all types of BRCA2 variants.</p><p><br></p><h3>Methods</h3><p dir="ltr">We developed an XGBoost-based machine learning model to predict pathogenicity of BRCA2 variants. …"
  10. 670

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل
  11. 671

    Arabic text recognition حسب Haraty, Ramzi

    منشور في 2004
    "…Thus, the need to attempt a research related to Arabic handwritten text recognition. Algorithms based on neural networks have proved to give better results than conventional methods when applied to problems where the decision rules of the classification problem are not clearly defined. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 672

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data حسب Arfan Ahmed (17541309)

    منشور في 2023
    "…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
  13. 673

    Cardiovascular health research priorities in the United Arab Emirates حسب Ghader, Nariman

    منشور في 2023
    "…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …"
    احصل على النص الكامل
    article
  14. 674

    The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias حسب King, Gretchen

    منشور في 2026
    "…A theoretical framework for analysing digital Orientalism is advanced through a historicisation of media imperialism, the military–industrial–communications complex and the political economy of AI in occupied Palestine. Grounded in research-based teaching methods, and employing a mixed-method content and frequency analysis and comparison of ChatGPT outputs in English and Arabic, this article expands research on AI biases, algorithmic oppression and digital divides within the context of digital Orientalism and anti-Palestinianism. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 675

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  16. 676

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 677

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  18. 678

    The role of Reinforcement Learning in software testing حسب Amr Abo-eleneen (17032284)

    منشور في 2023
    "…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
  19. 679

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…A comparative evaluation of three FL algorithms (FedAvg, FedProx, Mime-lite) identifies the most suitable aggregation strategy. …"
  20. 680