بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
element » elements (توسيع البحث)
-
501
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
منشور في 2023"…In this research, we evaluate the performance of traditional machine learning algorithms and data sampling techniques for JITDP problems and compare the model performance with the performance of a DL-based prediction model. …"
-
502
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
منشور في 2021"…<div><p>Machine learning (ML)-based prediction is considered an important technique for improving decision making during the planning process. …"
-
503
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
منشور في 2023"…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …"
-
504
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …"
-
505
-
506
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
507
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
508
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
509
Combinatorial method for bandwidth selection in wind speed kernel density estimation
منشور في 2019"…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …"
احصل على النص الكامل
-
510
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …"
-
511
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …"
احصل على النص الكامل
-
512
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
513
Towards Multimedia Fragmentation
منشور في 2006"…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
514
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
منشور في 2024"…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …"
-
515
Automatic White Blood Cell Differential Classification
منشور في 2005احصل على النص الكامل
doctoralThesis -
516
-
517
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
518
Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications
منشور في 2025"…</p><h3>Materials and methods</h3><p dir="ltr">An ensemble<u> species distribution modelling </u>approach, integrating regression-based and machine-learning algorithms (GLM, GBM, RF, MaxEnt), was used to project habitat suitability (Current time and by 2050, 2070, and 2090). …"
-
519
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
منشور في 2023"…Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
520
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"