بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
201
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
منشور في 2023"…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. …"
-
202
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
203
A clustering metaheuristic for large orienteering problems
منشور في 2022"…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …"
-
204
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
-
205
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016احصل على النص الكامل
doctoralThesis -
206
-
207
-
208
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
209
The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques
منشور في 2018"…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …"
احصل على النص الكامل
-
210
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
منشور في 2019احصل على النص الكامل
doctoralThesis -
211
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …"
-
212
Vibration suppression in a cantilever beam using a string-type vibration absorber
منشور في 2017"…In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
213
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
منشور في 2022"…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …"
-
214
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
منشور في 2023"…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …"
احصل على النص الكامل
-
215
-
216
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
217
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
218
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
منشور في 2020"…The feature selection uses Grey Wolf Optimisation and Binary Search algorithms for choosing the best features out of the dataset. …"
احصل على النص الكامل
-
219
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…The most frequently used NLP techniques are found to be TF-IDF and word embeddings. …"
احصل على النص الكامل
احصل على النص الكامل
-
220
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
منشور في 2020احصل على النص الكامل
doctoralThesis