يعرض 221 - 240 نتائج من 241 نتيجة بحث عن '(( elements method algorithm ) OR ((( data code algorithm ) OR ( based making algorithm ))))*', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 221

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …"
    احصل على النص الكامل
    article
  2. 222

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  3. 223
  4. 224

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance حسب Amr Zeedan (17983750)

    منشور في 2023
    "…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …"
  5. 225

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 226

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 227

    A data envelopment analysis model for opinion leaders’ identification in social networks حسب Hamed Baziyad (19273738)

    منشور في 2024
    "…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
  8. 228

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis حسب Nisreen Said Amer (17984077)

    منشور في 2024
    "…Electroencephalogram (EEG) analysis is crucial for diagnosing brain disorders, but it can be challenging for medical practitioners to interpret complex EEG signals and make accurate diagnoses. To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. …"
  9. 229
  10. 230

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability حسب Farah R. Zahir (18892108)

    منشور في 2017
    "…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
  11. 231

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  12. 232
  13. 233

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  14. 234

    An efficient cache replacement strategy for the hybrid cache consistency approach حسب Haraty, Ramzi A.

    منشور في 2010
    "…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 235
  16. 236

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 237

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 238

    Enhancing e-learning through AI: advanced techniques for optimizing student performance حسب Rund Mahafdah (21399854)

    منشور في 2024
    "…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …"
  19. 239

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  20. 240

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …"