بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
761
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
منشور في 2023"…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …"
-
762
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
منشور في 2025"…We combine features from all three modes of MMF-NIOM to achieve a state-of-the-art non-intrusive occupancy classification performance of 91.5 % accuracy and 91.5 % f1-score, approximately, by an ensemble of fine-tuned classifiers on the electricity consumption & occupancy (ECO) dataset. The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…"
-
763
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
764
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …"
-
765
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …"
-
766
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
منشور في 2018"…Compressive sensing (CS) has been explored as a method to extend the battery lifetime of medical wearable devices. …"
-
767
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
768
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
منشور في 2022"…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …"
-
769
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
منشور في 2025"…This review synthesizes evidence from more than 500 peer-reviewed studies published between 2020 and 2026, mapping DRL applications across distributed generation, transmission, distribution, energy storage systems, energy markets, local energy management, grid security, and data privacy. We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …"
-
770
-
771
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
772
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
منشور في 2022"…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
-
773
-
774
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
775
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
منشور في 2020"…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
-
776
Crown Structures for Vertex Cover Kernelization
منشور في 2007"…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. Two vertex cover kernelization methods are discussed. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
777
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
منشور في 2018"…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
778
Identification of phantom movements with an ensemble learning approach
منشور في 2022"…The ensemble learning-based approaches outperformed the SVM, Decision tree, and kNN methods. …"
-
779
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
-
780
Comparative Study on Arabic Text Classification: Challenges and Opportunities
منشور في 2022"…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…"
احصل على النص الكامل