Search alternatives:
method algorithm » mould algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
Showing 441 - 460 results of 719 for search '(( element rd algorithm ) OR ((( based method algorithm ) OR ( data processing algorithms ))))', query time: 0.13s Refine Results
  1. 441
  2. 442

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
    Get full text
  3. 443

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The benchmarking experiments of execution time and precision on architecture search and evaluation process showed better performance on recently available GPUs making it feasible to adopt architecture search based methods on large datasets.…”
  4. 444
  5. 445

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO by Majedeh Gheytanzadeh (17541927)

    Published 2022
    “…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
  6. 446

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS by Tekli, Joe

    Published 2018
    “…To do so, we design and construct a semantic-aware inverted index structure called SemIndex, extending the standard inverted index by constructing a tightly coupled inverted index graph that combines two main resources: a semantic network and a standard inverted index on a collection of textual data. We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 447

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…They consist of many processing nodes that interact by sending messages (containing both data and synchronization information) over a communication link, between nodes. …”
    Get full text
    Get full text
    article
  8. 448

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review by Uzair Shah (15740699)

    Published 2022
    “…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …”
  9. 449

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 450

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  11. 451

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
  12. 452

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…<p>This paper presents a design optimization algorithm for series-series compensated Inductive Power Transfer (IPT) system based on flat spiral coils, considering bifurcation phenomenon and AC equivalent resistance of the coils. …”
  13. 453

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  14. 454

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  15. 455
  16. 456

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis
  17. 457

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  18. 458

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…Originality/value In this paper, the authors present a full text-based auto-indexing method for Arabic text documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 459

    A linear programming approach for the weighted graph matchingproblem by Almohamad, H.A.

    Published 1993
    “…The linear program is solved using a simplex-based algorithm. Then, approximate 0-1 integer solutions are obtained by applying the Hungarian method on the real solutions of the linear program. …”
    Get full text
    Get full text
    article
  20. 460

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…In the proposed method, the chaotic variables are governed by cryptographic keys, crucial in generating data sequences. …”