بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
921
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
منشور في 2024"…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …"
-
922
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
منشور في 2022"…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …"
-
923
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
924
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
منشور في 2022"…Many FS-based swarm intelligence algorithms have been used to tackle FS. However, the door is still open for further investigations since no FS method gives cutting-edge results for all cases. …"
-
925
Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid
منشور في 2022"…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …"
-
926
Automatic White Blood Cell Differential Classification
منشور في 2005احصل على النص الكامل
doctoralThesis -
927
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
928
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
منشور في 2020"…Since the UAHPL model is directly related to hardware, this approach is better than those based on ordinary high-level languages or special microprogram languages. …"
احصل على النص الكامل
article -
929
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
930
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
منشور في 2021"…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …"
-
931
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
منشور في 2022"…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …"
-
932
Fuzzy controllers design using space-filling curves
منشور في 1998"…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …"
احصل على النص الكامل
احصل على النص الكامل
article -
933
Fuzzy Controllers Design Using Space-Filling Curves
منشور في 2020"…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …"
احصل على النص الكامل
article -
934
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
منشور في 2025"…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
-
935
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
936
Single-channel speech denoising by masking the colored spectrograms
منشور في 2025"…With a slightly reduced PESQ score (by 0.58 points), the proposed model offers an improvement of 2 % in STOI, and 4375 and 1135 times reduction respectively in the required number of training epochs and network parameters when compared to a GAN-based model augmented by WavLM; a large-scale self-supervised learning model. …"
-
937
Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression
منشور في 2023"…Further studies are needed to examine the performance of wearable AI based on a combination of wearable device data and neuroimaging data and to distinguish patients with depression from those with other diseases.…"
-
938
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
939
-
940
Identification of phantom movements with an ensemble learning approach
منشور في 2022"…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …"