يعرض 81 - 88 نتائج من 88 نتيجة بحث عن '(( relevant data algorithm ) OR ((( time evolution algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 81

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
    احصل على النص الكامل
  2. 82

    Vehicular-OBUs-As-On-Demand-Fogs حسب Sami, Hani

    منشور في 2020
    "…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 83

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review حسب Ruba, Sulaiman

    منشور في 2025
    "…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 84

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review حسب Ruba Sulaiman (17734065)

    منشور في 2025
    "…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …"
  5. 85

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…<div><p>Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolution is hampered by cybersecurity threats like spoofing, denial of service (DoS), distributed denial of service (DDoS) attacks, intrusions, malwares, authentication problems or other fatal attacks. …"
  6. 86

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  7. 87

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …"
  8. 88

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study حسب Alaa Abd-alrazaq (17058018)

    منشور في 2024
    "…</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …"