Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
fluent modeling » agent modeling (Expand Search), event modeling (Expand Search)
Showing 221 - 240 results of 274 for search '(( elements method algorithm ) OR ((( fluent modeling algorithm ) OR ( present study algorithm ))))', query time: 0.11s Refine Results
  1. 221
  2. 222

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 223

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  4. 224

    Diagnostic and therapeutic challenges of BRASH syndrome by Fateen Ata (12217764)

    Published 2021
    “…Further studies are warranted to understand the pathophysiology and develop better and accurate management algorithms. …”
  5. 225

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  6. 226

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…To achieve this goal, we present a formal specification for GIMPLE weaving and the implementation strategies of the proposed weaving semantics. …”
    Get full text
    Get full text
    Get full text
    article
  7. 227

    Reactive transport in porous media: a review of recent mathematical efforts in modeling geochemical reactions in petroleum subsurface reservoirs by Abdul Salam Abd (14151648)

    Published 2021
    “…We finally present two numerical cases from the literature to highlight the key variations between the different variable formulations and comment on the advantages and disadvantages of each approach.…”
  8. 228
  9. 229

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
  10. 230
  11. 231

    Artificial intelligence-based methods for fusion of electronic health records and imaging data by Farida Mohsen (16994682)

    Published 2022
    “…We present a comprehensive analysis of the various fusion strategies, the diseases and clinical outcomes for which multimodal fusion was used, the ML algorithms used to perform multimodal fusion for each clinical application, and the available multimodal medical datasets. …”
  12. 232

    The role of Reinforcement Learning in software testing by Amr Abo-eleneen (17032284)

    Published 2023
    “…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”
  13. 233

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…Naïve Bayes, Decision Trees offered the best predictions across the different sampling techniques. This study presents an approach to design and deploy a data mining project that can be used as a basis for developing systems to enable the selection of student majors.…”
    Get full text
  14. 234

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…This study focuses on the future prediction of the effectiveness of the COVID-19 vaccine effectiveness which has been presented as a light in the dark. …”
  15. 235

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey by Noorizadeh, Mohammad

    Published 2025
    “…The study underscored the potential of these techniques to enhance the diagnosis of lung pathologies and VAP and presents the advances in the field of smart biomedical applications. …”
    Get full text
    Get full text
    Get full text
    article
  16. 236

    Machine Learning Techniques for Pharmaceutical Bioinformatics by SULTAN, AHMED ATTA AHMED

    Published 2018
    “…A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. This dissertation presents a case study of predicted anti-cancer activity for 38 drugs. …”
    Get full text
  17. 237
  18. 238

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam (22304047)

    Published 2025
    “…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
  19. 239

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…Based on specific predefined criteria, a total of 100 research articles published between 2006 and 2022 were identified and analysed. We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
    Get full text
    Get full text
  20. 240

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text