يعرض 621 - 640 نتائج من 710 نتيجة بحث عن '(( elements method algorithm ) OR ((( based model algorithm ) OR ( data models algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 621

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 622

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species حسب Saleh Musleh (15279190)

    منشور في 2021
    "…We applied the SHAP algorithm to demonstrate the importance of most dominating features that were leveraged in the model. …"
  3. 623
  4. 624
  5. 625

    Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context حسب SALIM, MAHA JAWDAT

    منشور في 0024
    "…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …"
    احصل على النص الكامل
  6. 626
  7. 627

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 628

    Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM) حسب AL SHOUBAKI, HAMZA YOUNIS

    منشور في 2024
    "…We also explore a range of algorithms, including traditional classifiers and deep learning models, to determine and select the most suitable and accurate models of identifying poets' names from the verses. …"
    احصل على النص الكامل
  9. 629
  10. 630

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…"
  11. 631

    Vibration suppression in a cantilever beam using a string-type vibration absorber حسب Issa, Jimmy S.

    منشور في 2017
    "…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 632
  13. 633
  14. 634
  15. 635

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  16. 636

    Positive Unlabelled Learning to Recognize Dishes as Named Entity حسب TAREK, AIMAN

    منشور في 2019
    "…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …"
    احصل على النص الكامل
  17. 637

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  18. 638

    A novel technique for fast multiplication حسب Sait, Sadiq M.

    منشور في 2020
    "…In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithm is modelled in a hardware description language and its VLSI chip implemented. …"
    احصل على النص الكامل
    article
  19. 639

    Precision nutrition: A systematic literature review حسب Daniel Kirk (17302798)

    منشور في 2021
    "…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …"
  20. 640

    SemIndex: Semantic-Aware Inverted Index حسب Chbeir, Richard

    منشور في 2017
    "…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject