Showing 361 - 380 results of 388 for search '(( elements method algorithm ) OR ((( data code algorithm ) OR ( data learning algorithm ))))', query time: 0.12s Refine Results
  1. 361

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic by Saeed Al-Maroof, Rana

    Published 2020
    “…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
    Get full text
    Get full text
  2. 362
  3. 363

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  4. 364

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…Additionally, we evaluate the performance of the best developed model with children. Machine learning algorithms experiments showed that XGBoost achieved the best performance across all metrics (e.g., accuracy of 90%) and provided fast predictions (i.e., 0.004 s) for the test samples. …”
  5. 365

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 366

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
    Get full text
  7. 367

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 368

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  9. 369

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
  10. 370

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
  11. 371

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We build our model using machine learning techniques in particular rule-based models. …”
    Get full text
    Get full text
    masterThesis
  12. 372
  13. 373
  14. 374
  15. 375

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 376

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 377

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …”
  18. 378

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
  19. 379

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. …”
  20. 380

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article