يعرض 61 - 80 نتائج من 80 نتيجة بحث عن '(( implementing future algorithm ) OR ((( relevant data algorithm ) OR ( elements rd algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 61

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  2. 62

    An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study حسب Sara Al-Haidous (18095368)

    منشور في 2022
    "…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …"
  3. 63

    Novel biomarkers for potential risk stratification of drug induced liver injury (DILI) حسب Mohammed Ibn-Mas’ud Danjuma (13192169)

    منشور في 2019
    "…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …"
  4. 64

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
    احصل على النص الكامل
  5. 65

    Vehicular-OBUs-As-On-Demand-Fogs حسب Sami, Hani

    منشور في 2020
    "…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 66

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review حسب Ruba, Sulaiman

    منشور في 2025
    "…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 67

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review حسب Ruba Sulaiman (17734065)

    منشور في 2025
    "…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …"
  8. 68

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…It is built upon the extant data obfuscation paradigm. The future work lies with the implementation and establishment of its viability. …"
    احصل على النص الكامل
    احصل على النص الكامل
  9. 69

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  10. 70

    Using C++ to Calculate SO(10) Tensor Couplings حسب Bhagwagar, Azadan

    منشور في 2021
    "…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. …"
    احصل على النص الكامل
    article
  11. 71

    Distilling Wisdom: A Review on Optimizing Learning From Massive Language Models حسب Dingzong Zhang (23275066)

    منشور في 2025
    "…This survey provides a detailed discussion of the basic principles, algorithms, and implementation methods of knowledge distillation. …"
  12. 72

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"
  13. 73
  14. 74

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …"
  15. 75
  16. 76

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  17. 77

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
  18. 78

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …"
    احصل على النص الكامل
  19. 79

    Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges حسب Muhammad Mohsin Khan (22303366)

    منشور في 2025
    "…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …"
  20. 80

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study حسب Alaa Abd-alrazaq (17058018)

    منشور في 2024
    "…</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …"