بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
element new » elementi per (توسيع البحث)
data making » data mining (توسيع البحث)
encoding algorithm » cosine algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
element new » elementi per (توسيع البحث)
data making » data mining (توسيع البحث)
-
101
Plant disease detection using drones in precision agriculture
منشور في 2023"…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …"
-
102
A forward-backward Kalman for the estimation of time-variant channels in OFDM
منشور في 2005"…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
احصل على النص الكامل
احصل على النص الكامل
article -
103
Recovery of business intelligence systems
منشور في 2018"…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
104
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
منشور في 0000"…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
105
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…These attempts suffered from a major drawback which is the almost full Jacobian matrix of the nonlinear system of equations. This work presents a new approach for solving the fully coupled isothermal elastohydrodynamic problem using a finite element discretization of the corresponding equations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
106
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
منشور في 2018"…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
احصل على النص الكامل
-
107
Vehicular-OBUs-As-On-Demand-Fogs
منشور في 2020"…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
108
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
منشور في 2016"…The proposed GFT mechanism can be applied to any decision making problem within an uncertain environment. One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
109
Communications in electronic textile systems
منشور في 2017"…A new algorithm based on token grid schemes is presented that takes advantage of the e-textile physical configuration.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
110
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis -
111
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
112
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
منشور في 2021"…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
-
113
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …"
احصل على النص الكامل
-
114
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
115
PERF solutions for distributed query optimization. (c1999)
منشور في 1999احصل على النص الكامل
احصل على النص الكامل
masterThesis -
116
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
احصل على النص الكامل
article -
117
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
احصل على النص الكامل
احصل على النص الكامل
article -
118
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
119
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
120
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …"