يعرض 221 - 240 نتائج من 416 نتيجة بحث عن '(((( complement pso algorithm ) OR ( present study algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 221

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining حسب Koen Schaaf (14778139)

    منشور في 2021
    "…However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. …"
  2. 222
  3. 223

    A reduced model for phase-change problems with radiation using simplified PN approximations حسب Belhamadia, Youssef

    منشور في 2025
    "…Using the integro-differential equation for the radiative intensity in these models results in a system of coupled equations for which its numerical solution is computationally very demanding. In the present study, we develop a class of efficient reduced models for phase-change problems accounting for grey thermal radiation. …"
    احصل على النص الكامل
    article
  4. 224

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids حسب Sadah Mohammed (18192859)

    منشور في 2024
    "…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…"
  5. 225

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data حسب Harazaki, Manami

    منشور في 2012
    "…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 226
  7. 227

    Copy number variations in the genome of the Qatari population حسب Khalid A. Fakhro (3158862)

    منشور في 2015
    "…<p>The populations of the Arabian Peninsula remain the least represented in public genetic databases, both in terms of single nucleotide variants and of larger genomic mutations. We present the first high-resolution copy number variation (CNV) map for a Gulf Arab population, using a hybrid approach that integrates array genotyping intensity data and next-generation sequencing reads to call CNVs in the Qatari population. …"
  8. 228
  9. 229

    Determining Dominant Wind Directions حسب Selim, S.Z.

    منشور في 2020
    "…A case study which involves the construction of a transition probability matrix for the wind at a location is presented.…"
    احصل على النص الكامل
    article
  10. 230

    Lung cancer medical images classification using hybrid CNN-SVM حسب Abdulrazak Yahya Saleh (18520026)

    منشور في 2021
    "…Computer-Aided Detection (CAD) has been used to process CT images of the lung to determine whether an image has traces of cancer. This paper presents an image classification method based on the hybrid Convolutional Neural Network (CNN) algorithm and Support Vector Machine (SVM). …"
  11. 231

    Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network حسب Fares Almomani (12585685)

    منشور في 2020
    "…<p dir="ltr">The present study evaluates the effect of co-digestion of agricultural solid wastes (ASWs), cow manure (CM), and the application of chemical pre-treatment with NaHCO<sub>3</sub> on the performance of anaerobic digestion (AD) process. …"
  12. 232

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services حسب ALBARGHOTHI, ALI BAHA’EDDIN

    منشور في 2018
    "…In this study, we present an approach for automatic extraction of an ontology-based SW constructed from Arabic webpages related to Dubai’s e-government services. …"
    احصل على النص الكامل
  13. 233

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  14. 234
  15. 235

    De-Linkability حسب Haraty, Ramzi

    منشور في 2013
    "…We also provide a sanitizing MD*-algorithm to enforce de-linkability and present a set of experiments to demonstrate its efficiency.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 236

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …"
  17. 237

    Virtual Inertia Support in Power Systems for High Penetration of Renewables—Overview of Categorization, Comparison, and Evaluation of Control Techniques حسب Naruttam Kumar Roy (16904544)

    منشور في 2022
    "…Integrating intelligent methods, such as fuzzy logic, genetic algorithm, non-convex optimization, and heuristic optimization, signify intelligent control methods. …"
  18. 238

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…These capabilities support the various states of the typical cycle of dynamic cyber resilience, including threshold, bottom, and equilibrium states to increase CIIs robustness against cyberattacks, absorb frequent cyber disturbances that occurred, recover quickly from cyber failures, and re-establish their acceptable performance levels within appropriate timeframe. This thesis presents the novel proposed solution of dynamic cyber resilience using cyber zero-trust engineering for the first time to cope with highlighted shortcomings of the standard solutions, overcome the single hub node failure and enhance dynamic cyber resilience capabilities of interdependent CII networks against concurrent and consecutive cyberattacks to deliver their core services continuously. …"
    احصل على النص الكامل
  19. 239

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
  20. 240

    A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems حسب Raka Jovanovic (17947838)

    منشور في 2021
    "…The GRASP algorithm is used for case studies on several public transport systems having various properties and sizes. …"