بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
141
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
منشور في 2025"…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
-
142
-
143
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
-
144
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
منشور في 2022"…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
-
145
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
منشور في 2024"…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …"
-
146
-
147
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
148
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
احصل على النص الكامل
article -
149
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
منشور في 2022"…This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …"
-
150
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
151
-
152
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…Educational Data Mining (EDM) is the process of discovering information and relationships from educational data for better understanding of students’ performance, and characteristics of their education providers. …"
احصل على النص الكامل
-
153
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …"
-
154
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
منشور في 2023"…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …"
احصل على النص الكامل
-
155
-
156
FarmTech: Regulating the use of digital technologies in the agricultural sector
منشور في 2023"…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …"
-
157
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies.…"
احصل على النص الكامل
احصل على النص الكامل
-
158
Radial basis function networks for contingency analysis of bulkpower systems
منشور في 1999"…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. The motivation behind this work is to exploit the nonlinear mapping capabilities of RBFN in estimating line loading and bus voltage of a bulk power system following a contingency. …"
احصل على النص الكامل
احصل على النص الكامل
article -
159
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
منشور في 2023"…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. The ANN reliability is directly related to the success of the training process. …"
-
160
Contingency analysis of bulk power system using neural networks
منشور في 1998"…Radial basis function networks (RBFNs) are used for the contingency evaluation of bulk power systems. The motivation behind this work is to exploit the nonlinear mapping capabilities of RBFN in estimating line loading and bus voltages of a bulk power system following a contingency. …"
احصل على النص الكامل
احصل على النص الكامل
article