يعرض 421 - 440 نتائج من 454 نتيجة بحث عن '(( elements method algorithm ) OR ((( data models algorithm ) OR ( post processing algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 421

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer حسب Andrea Remo (447375)

    منشور في 2015
    "…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
  2. 422
  3. 423

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  4. 424

    Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection حسب Ajaj, Mohamad

    منشور في 2024
    "…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 425

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 426

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings حسب Ahmad Yaser Alhaddad (7017434)

    منشور في 2022
    "…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …"
  7. 427

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  8. 428

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 429

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks حسب Sakib Mahmud (15302404)

    منشور في 2025
    "…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
  10. 430

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass حسب Uzma Nawaz (21980708)

    منشور في 2025
    "…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
  11. 431

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  12. 432

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations حسب Md Mosarrof Hossen (21399056)

    منشور في 2025
    "…Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …"
  13. 433
  14. 434
  15. 435

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic حسب Saeed Al-Maroof, Rana

    منشور في 2020
    "…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
  16. 436

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 437

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 438

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 439

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…The main aim was to predict the initial leukemia disease. Machine learning algorithms such as decision tree (DT), naive bayes (NB), random forest (RF), gradient boosting machine (GBM), linear regression (LinR), support vector machine (SVM), and novel approach based on the combination of Logistic Regression (LR), DT and SVM named as ensemble LDSVM model. …"
  20. 440

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…An attacker can easily capture data from the available network channel and use it for their own purpose. …"