بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 801 - 820 نتائج من 897 نتيجة بحث عن '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( model using algorithm ))))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 801
  2. 802
  3. 803

    Condenser capacity and hyperbolic perimeterImage 1 حسب Mohamed M.S., Nasser

    منشور في 2021
    "…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 804

    Predicting stability of classes in an object-oriented system حسب Azar, D.

    منشور في 2010
    "…Many metrics have been proposed to assess these software attributes and for this purpose, prediction models have been widely used. However, in almost all cases, these models were not efficient when used to predict the quality characteristics (stability or other) of new unseen software as their prediction accuracy decreases significantly. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 805
  6. 806

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
    احصل على النص الكامل
  7. 807
  8. 808

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  9. 809
  10. 810
  11. 811
  12. 812

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
  13. 813

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …"
  14. 814

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem حسب Abu Zitar, Raed

    منشور في 2021
    "…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …"
    احصل على النص الكامل
  15. 815

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic حسب Saeed Al-Maroof, Rana

    منشور في 2020
    "…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
  16. 816

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer حسب Andrea Remo (447375)

    منشور في 2015
    "…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
  17. 817

    A Multi-Channel Convolutional Neural Network approach to automate the citation screening process حسب Raymon van Dinter (10521952)

    منشور في 2021
    "…This study aims to automate the citation screening process using Deep Learning algorithms. With this, it is aimed to reduce the time and costs of the citation screening process and increase the precision and recall of the relevant primary studies. …"
  18. 818

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks حسب Yassine Himeur (14158821)

    منشور في 2022
    "…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. …"
  19. 819

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC حسب Abbas, Nadine

    منشور في 2022
    "…Compared to conventional and state-of-the-art system models, results show the effectiveness of the proposed schemes and provide useful insights into the tradeoffs between the number of completed tasks, energy consumption and monetary cost.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 820

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…Given the limitations on accessing a real HVAC system for research purposes and the unavailability of public labeled datasets to investigate the cybersecurity of HVAC systems, this paper presents a dataset of a 12-zone HVAC system that was collected from a simulation model using the Transient System Simulation Tool (TRNSYS). …"