Search alternatives:
complement component » compliment compliment (Expand Search)
using algorithm » cosine algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
complement component » compliment compliment (Expand Search)
using algorithm » cosine algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
-
361
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
362
-
363
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
364
Modeling of Chlorophyll-a and Eutrophication Indicators in the Dubai Creek Area using Remote Sensing
Published 2015Get full text
doctoralThesis -
365
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
Published 2023“…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …”
Get full text
-
366
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
Get full text
Get full text
masterThesis -
367
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
368
-
369
-
370
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
371
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…The effect of surface area loading rate (SALR), organic matters (OMs), nutrients (N & P), feed flow rate (Q<sub>feed</sub>), hydraulic retention time (HRT), and internal recycle flow (IRF) on the performance of the ENR-BP to fulfil rigorous discharge limitations were evaluated. Experimental data was used to develop the appropriate architecture for the AAN using iterative steps of training and testing. …”
-
372
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
Published 2020“…The data is finally classified as either ransomware or goodware using the learning methodologies. …”
Get full text
-
373
-
374
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”
-
375
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…In our research, we introduce a comprehensive approach to Arabic poetry text classification using deep learning techniques. We have used an almost one-million record dataset of Arabic poetry verses extracted from a poetry encyclopedia. …”
Get full text
-
376
Cognitive Load Estimation Using a Hybrid Cluster-Based Unsupervised Machine Learning Technique
Published 2024“…In this study, we harnessed the capabilities of a four-channel, wearable EEG device that captured brain activity data during two distinct CL states: Baseline (representing a non-CL, resting state) and the Stroop Test (a CL-inducing state). …”
-
377
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
378
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…The proposed ANN based algorithm has been used for unswerving petite term forecasting. …”
Get full text
-
379
HVAC system attack detection dataset
Published 2021“…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
-
380
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
Published 2024“…The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”