بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
يعرض 541 - 560 نتائج من 620 نتيجة بحث عن '(( elements method algorithm ) OR ((( data detection algorithm ) OR ( based method algorithm ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 541

    Automated quantification of penile curvature using artificial intelligence حسب Tariq O. Abbas (11247771)

    منشور في 2022
    "…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…"
  2. 542

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis حسب Nisreen Said Amer (17984077)

    منشور في 2024
    "…Our study demonstrates the effectiveness of the FBFT method, achieving impressive accuracies across multiple brain disorders using CNN-based classification. …"
  3. 543

    Control of cardiac alternans by mechanical and electrical feedback حسب Yapari, Felicia

    منشور في 2014
    "…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …"
    احصل على النص الكامل
    article
  4. 544

    Fuzzy controllers design using space-filling curves حسب Elshafei-Ahmed, M.

    منشور في 1998
    "…We present a clustering technique for fuzzy rules based on Hilbert space-filling curves (SFC). SFC scans an n-dimensional space and reduces it to a curve, i.e. a one-dimensional line. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 545

    Fuzzy Controllers Design Using Space-Filling Curves حسب Elshafei-Ahmed, M

    منشور في 2020
    "…The paper introduces first the Hilber Space-filling curves, and outlines algorithms for clustering and adaptive clustering which demonstrate the SFC efficient self-organizing features. …"
    احصل على النص الكامل
    article
  6. 546

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions حسب Sahlan, Monireh Nosrati

    منشور في 2021
    "…The implementation of algorithms exposes high accuracy of the presented numerical method. …"
    احصل على النص الكامل
    article
  7. 547

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis حسب Ghada Al-Hussain (18295426)

    منشور في 2022
    "…Studies that examined the performance (accuracy, sensitivity, and specificity) of any ML algorithm in detecting pathological voice samples were included. …"
  8. 548

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
  9. 549
  10. 550

    Fine-grain watermarking for intellectual property protection حسب Stefano Giovanni Rizzo (18615112)

    منشور في 2019
    "…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …"
  11. 551

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. …"
  12. 552

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 553
  14. 554

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …"
    احصل على النص الكامل
  15. 555

    Failure recovery in wireless content distribution networks with device-to-device cooperation حسب Sharafeddine, Sanaa

    منشور في 2017
    "…We present low complexity effective algorithms based on clustering and tree construction methods in order to address three different types of dynamic node behavior, namely new devices joining the network, existing devices leaving the network, and existing devices moving locally within the network. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 556

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem حسب Abu Zitar, Raed

    منشور في 2021
    "…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …"
    احصل على النص الكامل
  17. 557

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 558

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  19. 559

    Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol حسب Santiago Hors-Fraile (5950823)

    منشور في 2018
    "…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …"
  20. 560

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care حسب Regina Padmanabhan (14231606)

    منشور في 2022
    "…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …"