بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
-
501
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
502
Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes
منشور في 2019"…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. The algorithm is first deployed in a simulated environment in which it was rigorously tested and compared with the correct solution. …"
احصل على النص الكامل
article -
503
The Assessment and Allocation of Public Private Partnership Risks in the UAE
منشور في 2022احصل على النص الكامل
doctoralThesis -
504
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
505
Particle swarm optimization approach for protein structure prediction in the 3D HP model
منشور في 2012"…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
506
High-order parametrization of the hypergeometric-Meijer approximants
منشور في 2023"…We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …"
-
507
-
508
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
509
Computation of conformal invariants
منشور في 2020"…We compare the performance and accuracy to previous results in the cases when numerical data is available and also in the case of several model problems where exact results are available.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
510
A METHODOLOGY FOR NETWORK TOPOLOGY DESIGN USING FUZZY EVALUATIONS
منشور في 2020"…In this paper, we present a methodology to address design issues. This methodology is based on two algorithms, namely, fuzzy simulated evolution algorithm and the augmenting path algorithm. …"
احصل على النص الكامل
article -
511
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
منشور في 2023"…In 2018 we reported a discovery study of a blood biomarker diagnostic test for ASD based on a combination of four plasma protein glycation and oxidation adducts. …"
-
512
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
513
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
منشور في 2023"…Among the task-specific models, the SVM trained on word data achieved the highest accuracy of 91.7%. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
514
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
منشور في 2023"…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
-
515
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
516
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
منشور في 2024"…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …"
-
517
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
منشور في 2022"…The I–V characteristics of conventional and reconfigured models are programmed into the simulator and the use of the hill climbing algorithm is validated. To analyze the voltage and power oscillations with MPP tracking, the PSO algorithm is also tested for two test patterns and its results are comprehensively studied.…"
-
518
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
519
Uplink Noma in UAV-Assisted IoT Networks
منشور في 2022"…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
520
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
منشور في 2023"…Among the task-specific models, the SVM trained on word data achieved the highest accuracy of 91.7%. …"