Showing 521 - 540 results of 602 for search '(( elements network algorithm ) OR ((( data code algorithm ) OR ( based modeling algorithm ))))*', query time: 0.13s Refine Results
  1. 521

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
  2. 522

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 523

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 524

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  5. 525

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
    Get full text
    article
  6. 526

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …”
  7. 527
  8. 528

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance by Amr Zeedan (17983750)

    Published 2023
    “…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …”
  9. 529

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS by Sait, Sadiq M.

    Published 2020
    “…Since the UAHPL model is directly related to hardware, this approach is better than those based on ordinary high-level languages or special microprogram languages. …”
    Get full text
    article
  10. 530

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  11. 531

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  12. 532

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
  13. 533

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…Lung-EffNet is built based on the architecture of EfficientNet and further modified by adding top layers in the classification head of the model. …”
  14. 534

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
    Get full text
  15. 535

    Fuzzy controllers design using space-filling curves by Elshafei-Ahmed, M.

    Published 1998
    “…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …”
    Get full text
    Get full text
    article
  16. 536

    Fuzzy Controllers Design Using Space-Filling Curves by Elshafei-Ahmed, M

    Published 2020
    “…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …”
    Get full text
    article
  17. 537
  18. 538

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
  19. 539

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…With a slightly reduced PESQ score (by 0.58 points), the proposed model offers an improvement of 2 % in STOI, and 4375 and 1135 times reduction respectively in the required number of training epochs and network parameters when compared to a GAN-based model augmented by WavLM; a large-scale self-supervised learning model. …”
  20. 540

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”