بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tool using » tools using (توسيع البحث)
يعرض 301 - 320 نتائج من 420 نتيجة بحث عن '(( elements network algorithm ) OR ((( data processing algorithm ) OR ( tool using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 301

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches حسب ALHAJERI, RASHED ABDULLA

    منشور في 2018
    "…It was also important to note that higher soiling did not correlate to higher cleaning requirements, as the cleaning was dependent not only on the soiling but on the PV output and cleaning costs. The algorithm was found to be an effective yet simple tool to help PV owners decide on cleaning procedures, however it does not take into account the effect of natural cleaning events. …"
    احصل على النص الكامل
  2. 302

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2015
    "…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 303

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 304

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
  5. 305

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
    احصل على النص الكامل
  6. 306

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 307

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  8. 308

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review حسب Uzair Shah (15740699)

    منشور في 2022
    "…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …"
  9. 309

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
  10. 310

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…The models presented prove that data analytics can create new value in an ETC environment. The methods and tools used for modeling the prediction model can be generalized to be used in the rest of the ETC system also. …"
    احصل على النص الكامل
  11. 311
  12. 312

    Topology and parameter estimation in power systems through inverter-based broadband stimulations حسب Margossian, Harag

    منشور في 2015
    "…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 313
  14. 314
  15. 315

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques حسب Joao Palotti (8479842)

    منشور في 2019
    "…However, the largest experiments conducted to date, have had only hundreds of participants. In this work, we processed the data of the recently published Multi-Ethnic Study of Atherosclerosis (MESA) Sleep study to have both PSG and actigraphy data synchronized. …"
  16. 316
  17. 317

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …"
    احصل على النص الكامل
  18. 318
  19. 319

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles حسب Wadi, Ali

    منشور في 2017
    "…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
    احصل على النص الكامل
    article
  20. 320

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea حسب Issa, Leila

    منشور في 2018
    "…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article