بدائل البحث:
using algorithms » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
-
121
-
122
-
123
-
124
-
125
Detecting sleep outside the clinic using wearable heart rate devices
منشور في 2022"…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …"
-
126
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
127
Correlation Clustering with Overlaps
منشور في 2020"…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
128
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
منشور في 2022"…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …"
-
129
Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control
منشور في 2021"…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …"
-
130
-
131
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
132
Topics in graph algorithms
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
133
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
منشور في 2022"…Therefore, this paper proposes a clustering and stochastic optimization methodology to handle the various challenges of OCA planning and scheduling. A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …"
-
134
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …"
احصل على النص الكامل
-
135
-
136
Predicting Plasma Vitamin C Using Machine Learning
منشور في 2022"…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …"
-
137
-
138
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
منشور في 2020"…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …"
-
139
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
140
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"