بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
over algorithm » deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
over algorithm » deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
101
-
102
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
103
-
104
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
منشور في 2025احصل على النص الكامل
doctoralThesis -
105
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
منشور في 2025"…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …"
-
106
-
107
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
-
108
-
109
A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition
منشور في 2025"…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. A crucial role for classification accuracy is played by the Lyapunov exponent or LE and the size of the dataset. …"
-
110
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
منشور في 2024"…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …"
-
111
-
112
A Survey of Machine Learning Innovations in Ambulance Services: Allocation, Routing, and Demand Estimation
منشور في 2024"…<p dir="ltr">In the realm of Emergency Medical Services (EMS), the integration of Machine Learning (ML) techniques has emerged as a catalyst for revolutionizing ambulance operations. ML algorithms could play a pivotal role in dynamically allocating resources, devising efficient routes, and predicting demand patterns. …"
-
113
An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication
منشور في 2019"…Of late, within the ambit of control of systems over networks, event-triggered control has proved to be instrumental in ensuring acceptable closed-loop performance while respecting bandwidth constraints of the underlying network. …"
-
114
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
منشور في 2024"…In a postfault scenario, a copula of processing blocks is implemented to ensure the reliability of the proposed method where high-importance features are incorporated into the TCN-GWO model. The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …"
-
115
Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas
منشور في 2024"…<p dir="ltr">Over the past decade, Unmanned Aerial Vehicles (UAVs) have attracted significant attention due to their potential applications in emergency-response applications, including wireless power transfer (WPT) and data collection from Internet of Things (IoT) devices in disaster-affected areas. …"
-
116
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.…"
-
117
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
118
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
119
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
منشور في 2006"…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
120
Information warfare
منشور في 2017"…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article