بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
c3 algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
c3 algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
-
101
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
منشور في 2011"…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
102
-
103
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
منشور في 2019"…<p dir="ltr">This paper investigates a reduced switch count topology for seven-level single-phase voltage-source inverter, nomenclatures as asymmetrical holding capacitor or also known as asymmetrical flying level capacitor or packed U-cell (PUC). Modular configuration of the inverter consists of one U-cell, four additional power switches, and one dc link. …"
-
104
BioNetApp: An interactive visual data analysis platform for molecular expressions
منشور في 2019"…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…"
-
105
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
106
A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks
منشور في 2022"…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. …"
-
107
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
108
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
منشور في 2020احصل على النص الكامل
doctoralThesis -
109
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
منشور في 2024"…Various CycleGAN architectures were experimented with and compared on this dataset. The best performing CycleGAN architecture successfully produced the reconstructed images with a high level of accuracy based on different quantitative and qualitative evaluation criteria. …"
-
110
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. Based on the obtained accuracy of the results, the proposed methodology has been found to be capable of inspecting rail track specimens in a completely non-contact manner with reasonably good accuracy…"
احصل على النص الكامل
-
111
Fault Diagnosis Based Machine Learning and Fault Tolerant Control of Multicellular Converter Used in Photovoltaic Water Pumping System
منشور في 2023"…In this study, a photovoltaic water pumping system with two power converters, the first is used to extract the maximum power using the maximum power point tracking (MPPT) algorithm, and the second is a three-cell multicellular power converter used to control the DC motor with a submerged pump. …"
-
112
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
113
Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors
منشور في 2016"…Performance variations of InGaP/InGaAs/Ge cells with respect to cell temperature and flux concentration ratio are identified using a two-diode equivalent circuit model and relations for the irradiance-dependent temperature coefficients are provided. …"
احصل على النص الكامل
article -
114
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
منشور في 2023"…<h3>Introduction</h3><p dir="ltr">Diabetes Mellitus (DM) is characterized by impaired ability to metabolize glucose for use in cells for energy, resulting in high blood sugar (hyperglycemia). …"
-
115
-
116
-
117
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
منشور في 2015"…The staining pattern of non-neoplastic mammary epithelial cells was used as a normal control. </p><h3>Results</h3><p dir="ltr">Using in-silico modeling of network-based strategy, we identified three top enriched MRs (NFAT5, CTNNB1 or β-catenin, and MGA) strongly linked to the IBC phenotype. …"
-
118
-
119
Parallel tabu search in a heterogeneous environment
منشور في 2003"…The multiobjective nature of this problem is addressed using a fuzzy goal-based cost computation.…"
احصل على النص الكامل
احصل على النص الكامل
article -
120
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
منشور في 2022"…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …"
احصل على النص الكامل