بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
261
-
262
A machine learning approach for localization in cellular environments
منشور في 2018"…A machine learning approach is developed for localization based on received signal strength (RSS) from cellular towers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
263
LDSVM: Leukemia Cancer Classification Using Machine Learning
منشور في 2022"…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
-
264
-
265
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Data-driven approaches, such as machine learning (ML), particularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
-
266
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
منشور في 2020"…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …"
-
267
-
268
-
269
Using machine learning to support students’ academic decisions
منشور في 2019"…This research tests and compares the performance of Decision Trees, Random Forests, Gradient-Boosted trees, and Deep Learning machine learning regression algorithms to predict student GPA. …"
احصل على النص الكامل
-
270
KNNOR: An oversampling technique for imbalanced datasets
منشور في 2021"…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
-
271
-
272
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
-
273
-
274
-
275
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
276
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
-
277
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
-
278
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
احصل على النص الكامل
article -
279
-
280
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis