يعرض 201 - 220 نتائج من 296 نتيجة بحث عن '(( relevant data algorithm ) OR ((( implement finding algorithm ) OR ( levels using algorithm ))))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 201

    Cyberbullying Detection Model for Arabic Text Using Deep Learning حسب Albayari, Reem

    منشور في 2023
    "…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
    احصل على النص الكامل
    احصل على النص الكامل
  2. 202

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  3. 203

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements حسب Katicha, Samer W.

    منشور في 2016
    "…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 204
  5. 205

    Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2012
    "…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 206

    A simulated annealing-based optimal controller for a three phase induction motor حسب Mantawy, A.H.

    منشور في 2002
    "…An adaptive cooling schedule and a new method for variables discretization are implemented to enhance the speed and convergence of the original simulated annealing algorithm (SAA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 207
  8. 208

    Novel biomarkers for potential risk stratification of drug induced liver injury (DILI) حسب Mohammed Ibn-Mas’ud Danjuma (13192169)

    منشور في 2019
    "…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …"
  9. 209

    Vehicular-OBUs-As-On-Demand-Fogs حسب Sami, Hani

    منشور في 2020
    "…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 210
  11. 211

    A novel approach for real time flows scheduling حسب Fawaz, W.

    منشور في 2006
    "…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 212
  13. 213

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review حسب Ruba, Sulaiman

    منشور في 2025
    "…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 214

    Blockchain-Based Decentralized Architecture for Software Version Control حسب Muhammad Hammad (17541570)

    منشور في 2023
    "…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"
  15. 215

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures حسب Ouaiss, Iyad

    منشور في 2017
    "…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 216

    Degree-Based Network Anonymization حسب Halawi, Ola

    منشور في 2020
    "…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 217
  18. 218

    A simple approach for testing web service based applications حسب Tarhini, Abbas

    منشور في 2005
    "…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 219

    3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA حسب Makkawi, Mohammad

    منشور في 2020
    "…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …"
    احصل على النص الكامل
    masterThesis
  20. 220

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
    احصل على النص الكامل
    masterThesis