بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
يعرض 741 - 760 نتائج من 846 نتيجة بحث عن '(( elements method algorithm ) OR ((( data using algorithm ) OR ( process model algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 741

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC حسب Abbas, Nadine

    منشور في 2022
    "…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 742
  3. 743

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  4. 744

    Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring حسب Zina Chkirbene (16869987)

    منشور في 2024
    "…We evaluate the performance of our proposed model and benchmark it against existing state-of-the-art techniques. …"
  5. 745

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  6. 746
  7. 747
  8. 748
  9. 749

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 750

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  11. 751

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  12. 752
  13. 753
  14. 754

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer حسب Andrea Remo (447375)

    منشور في 2015
    "…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
  15. 755

    SemIndex: Semantic-Aware Inverted Index حسب Chbeir, Richard

    منشور في 2017
    "…We also provide an extended query model and related processing algorithms with the help of SemIndex. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 756

    Artificial Intelligence for Skin Cancer Detection: Scoping Review حسب Abdulrahman Takiddin (14153181)

    منشور في 2021
    "…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…"
  17. 757

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 758

    Resilience analytics: coverage and robustness in multi-modal transportation networks حسب Abdelkader Baggag (14153040)

    منشور في 2018
    "…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …"
  19. 759

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis حسب Alaa Abd-Alrazaq (17430900)

    منشور في 2021
    "…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …"
  20. 760

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …"