Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 221 - 240 results of 435 for search '(( element method algorithm ) OR ((( data processing algorithm ) OR ( found using algorithm ))))*', query time: 0.12s Refine Results
  1. 221

    Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review by Zainab Jan (17306614)

    Published 2023
    “…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. …”
  2. 222

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  3. 223

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 224

    A clustering metaheuristic for large orienteering problems by Almiqdad Elzein (13141038)

    Published 2022
    “…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
  5. 225

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
  6. 226
  7. 227
  8. 228
  9. 229

    The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques by DOULEH, HANI ABDULLAH YOSEF ABU

    Published 2018
    “…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …”
    Get full text
  10. 230
  11. 231

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”
  12. 232

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
  13. 233

    Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models by AL SHAMSI, ARWA AHMED

    Published 2023
    “…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …”
    Get full text
  14. 234
  15. 235

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  16. 236

    A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network by KHAN, FIROZ

    Published 2020
    “…The feature selection uses Grey Wolf Optimisation and Binary Search algorithms for choosing the best features out of the dataset. …”
    Get full text
  17. 237

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…The most frequently used NLP techniques are found to be TF-IDF and word embeddings. …”
    Get full text
    Get full text
  18. 238
  19. 239

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
  20. 240

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. …”