يعرض 461 - 480 نتائج من 625 نتيجة بحث عن '(( presented using algorithm ) OR ((( element network algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 461

    Activity-level space scheduling حسب Zouein, Pierrette P.

    منشور في 1992
    "…An interactive and graphical decision-support tool, named MovePlan, is presented to assist in space scheduling. Its output layouts can be used to refine individual robot's trajectories using traditional path-planning algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 462

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. حسب Sebastian Kruse (18595195)

    منشور في 2020
    "…We show that our optimizer can perform tasks more than one order of magnitude faster when using multiple platforms than when using a single platform.…"
  3. 463

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 464
  5. 465
  6. 466
  7. 467
  8. 468
  9. 469

    De-Linkability حسب Haraty, Ramzi

    منشور في 2013
    "…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify the individual. We also provide a sanitizing MD*-algorithm to enforce de-linkability and present a set of experiments to demonstrate its efficiency.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 470

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…"
  11. 471
  12. 472
  13. 473

    K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation حسب Ashhadul Islam (16869981)

    منشور في 2022
    "…<p>Data is present in abundance, but the problem of imbalanced dataset crops up time and again, vexing classifiers and reducing accuracy. …"
  14. 474

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  15. 475

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …"
    احصل على النص الكامل
    article
  16. 476

    Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine حسب Shomope, Ibrahim

    منشور في 2024
    "…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …"
    احصل على النص الكامل
    article
  17. 477
  18. 478

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet حسب Imran Siddique (12705185)

    منشور في 2024
    "…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …"
  19. 479
  20. 480

    A Blockchain Model for Secure Communications in Internet of Vehicles حسب Mershad, Khaleel

    منشور في 2021
    "…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject