يعرض 341 - 360 نتائج من 419 نتيجة بحث عن '(( elements method algorithm ) OR ((( data code algorithm ) OR ( based learning algorithms ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 341

    Ensemble Deep Random Vector Functional Link Neural Network for Regression حسب Minghui Hu (2457952)

    منشور في 2022
    "…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …"
  2. 342
  3. 343
  4. 344

    Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System حسب Fahmida Haque (16896489)

    منشور في 2021
    "…The model accuracy was validated with the results from different machine learning algorithms. The Accuracy, sensitivity, and specificity of the ANFIS model are 91.17±1.18%, 92±2.26%, 96.72±0.93%, respectively. …"
  5. 345

    MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network حسب Sakib Mahmud (15302404)

    منشور في 2022
    "…Because the diagnosis of many neurological diseases is heavily reliant on clean EEG data, it is critical to eliminate motion artifacts from motion-corrupted EEG signals using reliable and robust algorithms. Although a few deep learning-based models have been proposed for the removal of ocular, muscle, and cardiac artifacts from EEG data to the best of our knowledge, there is no attempt has been made in removing motion artifacts from motion-corrupted EEG signals: In this paper, a novel 1D convolutional neural network (CNN) called multi-layer multi-resolution spatially pooled (MLMRS) network for signal reconstruction is proposed for EEG motion artifact removal. …"
  6. 346
  7. 347
  8. 348

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…"
  9. 349

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 350

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 351

    Systematic reviews in sentiment analysis: a tertiary study حسب Alexander Ligthart (14150871)

    منشور في 2022
    "…In addition to the tertiary study, we also identified recent 112 deep learning-based sentiment analysis papers and categorized them based on the applied deep learning algorithms. …"
  12. 352

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
  13. 353
  14. 354

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  15. 355

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 356

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 357
  18. 358

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network حسب Monzure-Khoda Kazi (17191207)

    منشور في 2024
    "…<p dir="ltr">This research aims to enhance the safety level and crash resiliency of targeted woven roving glass/epoxy composite material for various industry 4.0 applications. Advanced machine learning algorithms are used in this study to figure out the complicated relationship between the crashworthiness parameters of the hexagonal composite ring specimens under lateral compressive, energy absorption, and failure modes. …"
  19. 359

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…"
  20. 360

    Predicting Android Malware Using Evolution Networks حسب Chahine, Joy

    منشور في 2025
    "…With this aim, we introduce evolutionary networks, and particularly the Susceptible-Infectious-Susceptible (SIS) model, as a way to address the limitations of previous studies which are typically based on traditional machine learning models. The SIS model is usually used to represent disease spread between individuals in a population with transition between susceptible and infected states. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis