Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
Showing 661 - 680 results of 728 for search '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( based methods algorithm ))))', query time: 0.11s Refine Results
  1. 661
  2. 662

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  3. 663

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
    Get full text
    Get full text
  4. 664

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey by Noorizadeh, Mohammad

    Published 2025
    “…These VOCs can aid in the diagnosis of lung pathologies such as pneumonia. The CV processing method involves the application of advanced imaging techniques and machine learning algorithms to scrutinize and diagnose lung pathologies and ventilator-associated pneumonia (VAP). …”
    Get full text
    Get full text
    Get full text
    article
  5. 665

    An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks by Mohammad Zain Ul Abideen (16904637)

    Published 2022
    “…These algorithms calculate the optimal HC based on six scenarios of annual load and DER generation profiles. …”
  6. 666

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar (22046597)

    Published 2024
    “…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. …”
  7. 667

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions by Sahlan, Monireh Nosrati

    Published 2021
    “…The implementation of algorithms exposes high accuracy of the presented numerical method. …”
    Get full text
    article
  8. 668

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants by Mohannad N. Khandakji (13885434)

    Published 2022
    “…Local, gene-specific information have been shown to aid variant pathogenicity prediction; therefore, our aim was to develop a BRCA2-specific machine learning model to predict pathogenicity of all types of BRCA2 variants.</p><p><br></p><h3>Methods</h3><p dir="ltr">We developed an XGBoost-based machine learning model to predict pathogenicity of BRCA2 variants. …”
  9. 669

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  10. 670

    Arabic text recognition by Haraty, Ramzi

    Published 2004
    “…Thus, the need to attempt a research related to Arabic handwritten text recognition. Algorithms based on neural networks have proved to give better results than conventional methods when applied to problems where the decision rules of the classification problem are not clearly defined. …”
    Get full text
    Get full text
    Get full text
    article
  11. 671

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …”
  12. 672

    Cardiovascular health research priorities in the United Arab Emirates by Ghader, Nariman

    Published 2023
    “…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …”
    Get full text
    article
  13. 673

    The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias by King, Gretchen

    Published 2026
    “…A theoretical framework for analysing digital Orientalism is advanced through a historicisation of media imperialism, the military–industrial–communications complex and the political economy of AI in occupied Palestine. Grounded in research-based teaching methods, and employing a mixed-method content and frequency analysis and comparison of ChatGPT outputs in English and Arabic, this article expands research on AI biases, algorithmic oppression and digital divides within the context of digital Orientalism and anti-Palestinianism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 674

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  15. 675

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
    Get full text
    Get full text
    Get full text
    article
  16. 676

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  17. 677

    The role of Reinforcement Learning in software testing by Amr Abo-eleneen (17032284)

    Published 2023
    “…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”
  18. 678

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations by Md Mosarrof Hossen (21399056)

    Published 2025
    “…A comparative evaluation of three FL algorithms (FedAvg, FedProx, Mime-lite) identifies the most suitable aggregation strategy. …”
  19. 679
  20. 680

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article