يعرض 41 - 60 نتائج من 112 نتيجة بحث عن '(( elements means algorithm ) OR ((( data code algorithm ) OR ( based could algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 41

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
  2. 42

    Towards a Unified Arabic Government Services Chatbot Based on Ontology حسب Areed, Sufyan

    منشور في 2020
    "…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…"
    احصل على النص الكامل
  3. 43
  4. 44

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …"
    احصل على النص الكامل
  5. 45

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia حسب Hanan Ehtewish (17149825)

    منشور في 2023
    "…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …"
  6. 46
  7. 47
  8. 48

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study حسب Alaa Abd-alrazaq (17058018)

    منشور في 2024
    "…Furthermore, future studies could evaluate more efficient modeling algorithms, especially those combining topic modeling with statistical uncertainty quantification, such as conformal prediction.…"
  9. 49

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…Additionally, potential interaction between differentially expressed lncRNAs such as H19, SNHG5, and GATA2-AS1 with multiple miRNAs has been revealed. Taken together, our data provides thorough analysis of dysregulated protein-coding and non-coding RNAs in CRC highlighting numerous associations and regulatory networks thus providing better understanding of CRC.…"
  10. 50

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives حسب Yassine Himeur (14158821)

    منشور في 2021
    "…In this regard, this paper is an in-depth review of existing anomaly detection frameworks for building energy consumption based on artificial intelligence. Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …"
  11. 51
  12. 52
  13. 53

    Optimal Sizing and Techno-Economic Analysis of Hybrid Renewable Energy Systems—A Case Study of a Photovoltaic/Wind/Battery/Diesel System in Fanisau, Northern Nigeria حسب Nasser Yimen (16697129)

    منشور في 2020
    "…This study highlighted the role that solar PV-based HRESs could play in the sustainable electricity supply in rural areas of sub-Saharan Africa.…"
  14. 54

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach حسب Aya Hasan Alkhereibi (17151070)

    منشور في 2021
    "…Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …"
  15. 55

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…It had an impressive accuracy of 99.99%, and it could mitigate DDoS attacks in less than 3 s. We conducted a comparative analysis of various models and algorithms used in the related works. …"
  16. 56

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…"
  17. 57

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 58
  19. 59

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 60

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"