يعرض 281 - 300 نتائج من 751 نتيجة بحث عن '(( elements method algorithm ) OR ((( data models algorithm ) OR ( data using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 281

    Convergence behavior of the normalized least mean fourth algorithm حسب Zerguine, A.

    منشور في 2000
    "…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 282

    Three-phase simulated annealing algorithms for exam scheduling حسب Mansour, Nashat

    منشور في 2003
    "…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 283

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications حسب Daoud, Mohammad Sh.

    منشور في 2023
    "…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
    احصل على النص الكامل
  4. 284
  5. 285

    A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS حسب Zerguine, Azzedine

    منشور في 2020
    "…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …"
    احصل على النص الكامل
    article
  6. 286

    A hybrid graph representation for recursive backtracking algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 287

    Social spider optimization algorithm: survey and new applications حسب Abualigah, Laith

    منشور في 2024
    "…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …"
    احصل على النص الكامل
  8. 288
  9. 289

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  10. 290

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture حسب Moutaz Alazab (17730060)

    منشور في 2025
    "…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
  11. 291

    A comparison of optimization heuristics for the data mapping problem حسب Mansour, Nashat

    منشور في 1997
    "…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 292
  13. 293

    A fast exact sequential algorithm for the partial digest problem حسب Mostafa M. Abbas (17058093)

    منشور في 2016
    "…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
  14. 294

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 295
  16. 296

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review حسب Avneet Kaur (712349)

    منشور في 2024
    "…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
  17. 297
  18. 298

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  19. 299

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques حسب Arifa Zahir (20748764)

    منشور في 2024
    "…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …"
  20. 300

    Evolutionary algorithms for state justification in sequential automatic test pattern generation حسب El-Maleh, Aiman H.

    منشور في 2005
    "…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
    احصل على النص الكامل
    article