بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
system » systems (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
system » systems (توسيع البحث)
-
101
A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System
منشور في 2021"…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …"
-
102
-
103
Malicious URL and Intrusion Detection using Machine Learning
منشور في 2024"…Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). …"
احصل على النص الكامل
article -
104
-
105
Modeling and Control of Nonlinear Systems Using Wavelet Networks
منشور في 2006احصل على النص الكامل
doctoralThesis -
106
AI-Aided Robotic Wide-Range Water Quality Monitoring System
منشور في 2024احصل على النص الكامل
article -
107
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
108
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
منشور في 2023"…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
-
109
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…The initial statistical and convergence profile assessment showed better performance of the proposed algorithm. The comparative analyses for transient and frequency responses were performed for the PID-controlled FES system using the original AOA, sine–cosine and particle swarm optimization algorithms and the traditional Ziegler-Nichols tuning scheme. …"
-
110
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
منشور في 2021"…We research and test the design of the right neural networks that achieves our goal. A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …"
احصل على النص الكامل
احصل على النص الكامل
-
111
-
112
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact laser transduction system
منشور في 2020"…The focus of this study is on locating surface and sub-surface defects that occur in rail tracks using Rayleigh waves that were emitted and sensed by a fully non-contact laser transduction system. …"
احصل على النص الكامل
-
113
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
منشور في 2005"…The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …"
احصل على النص الكامل
احصل على النص الكامل
article -
114
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …"
-
115
-
116
-
117
Contingency analysis of bulk power system using neural networks
منشور في 1998"…Radial basis function networks (RBFNs) are used for the contingency evaluation of bulk power systems. …"
احصل على النص الكامل
احصل على النص الكامل
article -
118
Optimal design of power system stabilizers using evolutionary programming
منشور في 2002"…The optimal design of power system stabilizers (PSSs) using evolutionary programming (EP) optimization technique is presented in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
article -
119
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
منشور في 2024"…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. …"
-
120