بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
-
241
-
242
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. …"
-
243
Deep Learning-Based Fault Diagnosis of Photovoltaic Systems: A Comprehensive Review and Enhancement Prospects
منشور في 2021"…Recently, due to the enhancement of computing capabilities, the increase of the big data use, and the development of effective algorithms, the deep learning (DL) tool has witnessed a great success in data science. …"
-
244
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
منشور في 2014احصل على النص الكامل
doctoralThesis -
245
Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry
منشور في 2016"…The method relies on a variational assimilation approach where a velocity correction is continuously obtained by matching observed drifter positions with those predicted by a simple advection model. The background velocity used in the advection of the drifters is the aggregate of a geostrophic and a wind-driven component and the velocity correction is constrained to be divergence free. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
246
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
-
247
Boosting the visibility of services in microservice architecture
منشور في 2023"…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"
-
248
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
منشور في 2024"…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …"
-
249
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
منشور في 2024"…In a postfault scenario, a copula of processing blocks is implemented to ensure the reliability of the proposed method where high-importance features are incorporated into the TCN-GWO model. The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …"
-
250
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
منشور في 2022"…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
احصل على النص الكامل
-
251
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
منشور في 2023"…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …"
احصل على النص الكامل
-
252
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
253
Stochastic Search Algorithms for Exam Scheduling
منشور في 2007"…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
احصل على النص الكامل
احصل على النص الكامل
article -
254
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
منشور في 2023"…Deep learning models were the most prominent branch of AI used for pancreatic cancer diagnosis in the studies, and the convolutional neural network was the most used algorithm (18/30, 60%). …"
-
255
-
256
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
257
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
258
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
احصل على النص الكامل
article -
259
-
260
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …"