بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
-
261
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
262
Optimizing ADWIN for Steady Streams
منشور في 2022"…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
263
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …"
احصل على النص الكامل
-
264
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
-
265
Evacuation of a highly congested urban city
منشور في 2017"…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
266
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …"
احصل على النص الكامل
-
267
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
268
High-order parametrization of the hypergeometric-Meijer approximants
منشور في 2023"…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …"
-
269
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
270
FoGMatch
منشور في 2019"…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
271
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"
-
272
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
منشور في 2021"…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …"
-
273
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
274
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
275
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
276
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …"
-
277
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
278
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
279
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
280
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject