بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث)
code generation » power generation (توسيع البحث), image generation (توسيع البحث)
wide detection » video detection (توسيع البحث), fire detection (توسيع البحث), ion detection (توسيع البحث)
generation algorithm » genetic algorithm (توسيع البحث)
code generation » power generation (توسيع البحث), image generation (توسيع البحث)
wide detection » video detection (توسيع البحث), fire detection (توسيع البحث), ion detection (توسيع البحث)
-
1
AI-Aided Robotic Wide-Range Water Quality Monitoring System
منشور في 2024احصل على النص الكامل
article -
2
-
3
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …"
-
4
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
منشور في 2021"…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …"
-
5
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022"…During coding, 64 proposed features were generated from the coder for each frame. …"
احصل على النص الكامل
article -
6
-
7
Generating haptic texture using solid noise
منشور في 2021"…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …"
-
8
-
9
Dynamic adaptation for video streaming over mobile devices. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
10
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. The purpose of this paper is to evaluate fractional repetition (FR) codes, a class of regenerating codes for distributed storage systems, as a practical solution. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
11
-
12
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…Obtained results using 4000 synthetic writers of GPDS synthetic database show that the proposed handcrafted features have considerable ability to detect synthetic signatures vs. two widely used real individuals signatures databases, namely CEDAR and GPDS-300, which reach 98.67% and 94.05% of successful synthetic detection rates respectively.…"
احصل على النص الكامل
-
13
A new genetic algorithm approach for unit commitment
منشور في 1997"…In the proposed algorithm, coding the solution of the unit commitment problem is based on mixing binary and decimal representations. …"
احصل على النص الكامل
احصل على النص الكامل
article -
14
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …"
احصل على النص الكامل
-
15
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. …"
احصل على النص الكامل
احصل على النص الكامل
article -
16
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
17
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
18
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
منشور في 1999"…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
19
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
منشور في 2022"…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …"
احصل على النص الكامل
-
20
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article