بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
case modeling » based modeling (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
case modeling » based modeling (توسيع البحث)
-
221
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
222
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Secondly, to illustrate the gravity of these issues, we present a case study on the task of human facial emotion recognition (FER) based on AffectNet dataset, where we analyze the effects of widely used input quantization on the security, robustness, fairness, and trustworthiness of an EML model. …"
-
223
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
224
-
225
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
226
-
227
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
منشور في 2025"…Three different publicly available datasets have been used based on the age group to create the best predicting model for each case. After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …"
-
228
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Five different scenarios are used to test and validate the created model, and in each case, the proposed method is found to be superior to the current methodology in terms of range, energy, density, time periods, and total metrics of operation.…"
-
229
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
230
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
231
A new bi-objective model of the urban public transportation hub network design under uncertainty
منشور في 2019"…Our experimental results demonstrated the validity of our developed model and approaches. Moreover, an intensive sensitivity analyze study is carried out on a real-case application related to the monorail project of the holy city of Qom.…"
-
232
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …"
احصل على النص الكامل
-
233
Stochastic Geometry-Based Model for Dynamic Allocation of Metering Equipment in Spatio-Temporal Expanding Power Grids
منشور في 2019"…Using the developed model, a multi-year algorithm for the allocation of metering equipment is proposed based on finite horizon dynamic programming, given budgetary and technical constraints on system observability. …"
احصل على النص الكامل
article -
234
Stability improvement of the PSS-connected power system network with ensemble machine learning tool
منشور في 2022"…Furthermore, results for various loading conditions were prepared to check the robustness of the proposed model. A comparative study of the proposed approach with NG, ELM, MGGP models, and two reference cases along with the conventional method will validate the superiority of the employed ML approach.…"
-
235
A combined resource allocation framework for PEVs charging stations, renewable energy resources and distributed energy storage systems
منشور في 2017"…A sample case study is presented to illustrate the performance of the algorithm.…"
احصل على النص الكامل
article -
236
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …"
-
237
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…The accuracy of these models largely depends on the size and quality of the training dataset. …"
-
238
-
239
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …"
-
240
An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models
منشور في 2024"…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. Conventional construction models typically optimize only a single objective, such as time, cost, or delay, which may not effectively enhance overall performance. …"