يعرض 181 - 200 نتائج من 217 نتيجة بحث عن '(( element method algorithm ) OR ((( spatial modeling algorithm ) OR ( data making algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 181

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…"
  2. 182
  3. 183

    From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors حسب Michael R. Giordano (9976173)

    منشور في 2021
    "…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. Here we review the needs and challenges when trying to get high-quality data from low-cost sensors. …"
  4. 184

    Resilience analytics: coverage and robustness in multi-modal transportation networks حسب Abdelkader Baggag (14153040)

    منشور في 2018
    "…A future goal is to use this experience to make projections for a fast growing city like Doha.…"
  5. 185

    PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning حسب Gabriele Oligeri (14151426)

    منشور في 2022
    "…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …"
  6. 186

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images حسب Rehan Raza (17019105)

    منشور في 2023
    "…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"
  7. 187
  8. 188

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  9. 189

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) حسب Fares Almomani (12585685)

    منشور في 2020
    "…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …"
  10. 190

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 191

    Control of cardiac alternans by mechanical and electrical feedback حسب Yapari, Felicia

    منشور في 2014
    "…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …"
    احصل على النص الكامل
    article
  12. 192

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  13. 193

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 194

    Approximate XML structure validation based on document–grammar tree similarity حسب Tekli, Joe

    منشور في 2015
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 195
  16. 196

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 197
  18. 198
  19. 199

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  20. 200

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل