يعرض 681 - 700 نتائج من 753 نتيجة بحث عن '(( element method algorithms ) OR ((( data using algorithm ) OR ( data learning algorithm ))))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 681
  2. 682

    A survey and comparison of wormhole routing techniques in a meshnetworks حسب Al-Tawil, K.M.

    منشور في 1997
    "…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 683
  4. 684
  5. 685
  6. 686

    Dataset built for Arabic Sentiment Analysis حسب AL MUKHAITI, AYESHA JUMAA SALEM

    منشور في 2016
    "…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
    احصل على النص الكامل
  7. 687

    Inferential sensing techniques in industrial applications حسب Shakil,, Muhammad

    منشور في 0007
    "…Real data from a boiler plant is used to develop the model. …"
    احصل على النص الكامل
    masterThesis
  8. 688

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …"
  9. 689
  10. 690
  11. 691

    A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System حسب Kouatli, Issam

    منشور في 2016
    "…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 692

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC حسب Abbas, Nadine

    منشور في 2022
    "…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 693
  14. 694

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  15. 695
  16. 696

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  17. 697
  18. 698
  19. 699

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 700

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"