يعرض 721 - 740 نتائج من 897 نتيجة بحث عن '(( element method algorithm ) OR ((( data processing algorithm ) OR ( model using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 721

    Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review حسب SHEHADEH, KHADIJA

    منشور في 2023
    "…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …"
    احصل على النص الكامل
  2. 722

    Single channel speech denoising by DDPG reinforcement learning agent حسب Sania Gul (18272227)

    منشور في 2025
    "…For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. It achieves this performance by utilizing data that is 7 times smaller than that required by other models. …"
  3. 723

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls حسب SANAD, AYMAN ADEL AHMED

    منشور في 2025
    "…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …"
    احصل على النص الكامل
  4. 724

    Combined cycle gas turbine system optimization for extended range electric vehicles حسب Barakat, Aya A.

    منشور في 2020
    "…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 725

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control حسب Mahmoud Dahmani (18810247)

    منشور في 2020
    "…The first three techniques were automatic, employ correlation, and were variants of template matching, whereas the last one uses convolutional neural networks (CNNs). Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …"
  6. 726

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization حسب De Rochechouart, Maxence

    منشور في 2023
    "…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …"
    احصل على النص الكامل
  7. 727
  8. 728

    Reconstruction and simulation of neocortical microcircuitry حسب Khazen, Georges

    منشور في 2015
    "…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 729

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling حسب Majed Hadid (17148364)

    منشور في 2022
    "…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …"
  10. 730

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care حسب Regina Padmanabhan (14231606)

    منشور في 2022
    "…The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …"
  11. 731
  12. 732

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 733

    Anonymizing multimedia documents حسب Haraty, Ramzi

    منشور في 2016
    "…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 734
  15. 735

    Computational evluation of protein energy functions حسب Mansour, Nashat

    منشور في 2014
    "…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 736
  17. 737
  18. 738
  19. 739

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids حسب Sadah Mohammed (18192859)

    منشور في 2024
    "…This computational framework can expedite and improve the process of finding desirable molecular structures of IL via accurate property predictions in a data-driven manner. …"
  20. 740