بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
يعرض 161 - 180 نتائج من 486 نتيجة بحث عن '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( most modeling algorithm ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 161
  2. 162

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  3. 163
  4. 164

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  5. 165
  6. 166

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
  7. 167
  8. 168

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 169

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. …"
  10. 170
  11. 171

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms حسب Abdelouahed Hamdi (14158899)

    منشور في 2022
    "…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. …"
  12. 172

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights حسب Malekloo, Arman

    منشور في 2021
    "…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
    احصل على النص الكامل
    article
  13. 173
  14. 174

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
    احصل على النص الكامل
  15. 175
  16. 176

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 177

    Hardware Model of an Expandable RSA Cryptographic System حسب Gutub, Adnan

    منشور في 1998
    "…To retrieve such information, the encrypted form must be first decrypted. One of the most popular cryptographic systems is the RSA system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 178

    A control algorithm to increase the efficient operation of wind energy conversion systems under extreme wind conditions حسب Nyam Jargalsaikhan (17380429)

    منشور في 2022
    "…<p dir="ltr">This paper aims to increase the power production of gearless permanent magnet synchronous generator (PMSG) based wind energy conversion systems (WECS) in strong (greater than 25 m/s) wind speed regions. In general, most wind turbines cut off when wind speed is over the cut-out rate; as a result, the power generation of the wind farm decreases. …"
  19. 179

    Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare حسب MOHAMMAD, AHMAD HASAN

    منشور في 2023
    "…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …"
    احصل على النص الكامل
  20. 180

    EVALUATION OF OPTIMIZATION METHODS FOR MACHINING ECONOMICS MODELS حسب Duffuaa, S. O.

    منشور في 2020
    "…This paper compares the performances and the utilities of six algorithms to identify the most suitable one(s) for solving the machining models. …"
    احصل على النص الكامل
    article