يعرض 121 - 140 نتائج من 203 نتيجة بحث عن 'differences processing (algorithms OR algorithm)', وقت الاستعلام: 0.07s تنقيح النتائج
  1. 121
  2. 122

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review حسب Zainab Jan (17306614)

    منشور في 2021
    "…The most commonly used data belonged to the clinical category (19, 58%). We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …"
  3. 123

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks حسب Abbas, Nadine

    منشور في 2015
    "…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 124

    Big Data Energy Management, Analytics and Visualization for Residential Areas حسب Gupta, Ragini

    منشور في 2020
    "…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. To achieve this, two big data processing paradigms are evaluated with a set of qualitative and quantitative metrics with subsequent recommendations. …"
    احصل على النص الكامل
    article
  5. 125

    A multi-pretraining U-Net architecture for semantic segmentation حسب Cagla Copurkaya (22502042)

    منشور في 2025
    "…In this research, we propose and evaluate a modified version of a deep learning algorithm called U-Net architecture for partitioning histopathological images. …"
  6. 126

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks حسب Mohamed Amjath (17542512)

    منشور في 2022
    "…This study considers determining the optimal size of a homogeneous fleet of trucks to be outsourced (or subcontracted) from a third-party logistics provider to be used daily to cyclically transport different types of raw materials from designated storage yards to intermediate buffer locations to be fed as inputs to a production facility for processing. …"
  7. 127

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Among other methodologies, the CSOM has the unique characteristics of increased searching efficiency, high convergence, and fast processing speed. During the evaluation, the different types of cyber-threat datasets are considered for testing and validation, and the results are compared with the recent state-of-the-art model approaches.…"
  8. 128
  9. 129

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 130

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks حسب Insaf Kraidia (19198012)

    منشور في 2024
    "…This enhancement significantly fortifies the model's resistance to adversarial attacks by introducing complexity into attackers' attempts to anticipate the model's prediction integration process. Consequently, this leads to a remarkable average performance improvement of 25% across 14 different attack scenarios and various datasets, surpassing the capabilities of current state-of-the-art methods.…"
  11. 131

    EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach حسب Muhammad Adeel Asghar (6724982)

    منشور في 2019
    "…A series of vocabularies consisting of 10 cluster centers of each class is calculated using the k-means cluster algorithm. Lastly, the emotion of each subject is represented using the histogram of the vocabulary set collected from the raw-feature of a single channel. …"
  12. 132

    Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection حسب Atiq ur Rehman (3044409)

    منشور في 2024
    "…Although Evolutionary Algorithms (EAs) have shown promise in the literature for feature selection, creating EAs for high dimensions is still challenging. …"
  13. 133
  14. 134

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review حسب Avneet Kaur (712349)

    منشور في 2024
    "…The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
  15. 135
  16. 136

    Compensation of axle-generator errors due to wheel slip and slide حسب Saab, Samer S.

    منشور في 2002
    "…The algorithm identifies the wheel slip and slide by examining the variation of the processed vehicle longitudinal acceleration. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 137
  18. 138

    Enhancing e-learning through AI: advanced techniques for optimizing student performance حسب Rund Mahafdah (21399854)

    منشور في 2024
    "…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …"
  19. 139

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 140