يعرض 121 - 140 نتائج من 513 نتيجة بحث عن '(( elements method algorithm ) OR ((( data models algorithm ) OR ( data detection algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 121

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data حسب Arfan Ahmed (17541309)

    منشور في 2023
    "…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…"
  2. 122

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology حسب Senyuk, Mihail

    منشور في 2023
    "…This work employs machine learning methods to develop and test a technique for dynamic stability analysis of the mathematical model of a power system. A distinctive feature of the proposed method is the absence of a priori parameters of the power system model. …"
    احصل على النص الكامل
    article
  3. 123

    VEGAWES: variational segmentation on whole exome sequencing for copy number detection حسب Samreen Anjum (19651882)

    منشور في 2015
    "…We tested this algorithm on synthetic data and 100 Glioblastoma Multiforme primary tumor samples. …"
  4. 124
  5. 125

    Design of adaptive arrays based on element position perturbations حسب Dawoud, M.M.

    منشور في 1993
    "…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 126

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark حسب Ameema Zainab (16864263)

    منشور في 2021
    "…However, with the huge increase in data size, sophisticated models have to be created which require big data platforms. …"
  7. 127
  8. 128

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
  9. 129
  10. 130
  11. 131

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture حسب Moutaz Alazab (17730060)

    منشور في 2025
    "…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …"
  12. 132
  13. 133

    Deep and transfer learning for building occupancy detection: A review and comparative analysis حسب Aya Nabil Sayed (17317006)

    منشور في 2022
    "…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …"
  14. 134
  15. 135
  16. 136

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  17. 137
  18. 138

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy حسب Haitao Xu (435549)

    منشور في 2023
    "…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …"
  19. 139
  20. 140

    Predict Student Success and Performance factors by analyzing educational data using data mining techniques حسب ATIF, MUHAMMAD

    منشور في 2022
    "…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …"
    احصل على النص الكامل