بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
281
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…Techniques for natural language processing may be used to text data to extract useful features like sentiment, emotion, and subjectivity. …"
احصل على النص الكامل
-
282
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
منشور في 2020"…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …"
-
283
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
منشور في 2007"…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
284
Data Redundancy Management in Connected Environments
منشور في 2020"…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
285
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
-
286
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
287
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
منشور في 2023احصل على النص الكامل
doctoralThesis -
288
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
منشور في 2022"…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. The cumulative case data of the clustered countries enriched with data related to the lockdown measures are fed to the bidirectional LSTM to train the forecasting model. …"
-
289
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
منشور في 2021"…Initially, the optimization model and convergence characteristics of JAYA algorithm are carefully analyzed. …"
احصل على النص الكامل
-
290
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
منشور في 2020"…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. …"
-
291
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
منشور في 2025"…Three different publicly available datasets have been used based on the age group to create the best predicting model for each case. …"
-
292
An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling
منشور في 2016"…The work presented in thesis add to the existing literature in a proposing the use of a genetic algorithm uncertain approach to resource- scheduling in projects. …"
احصل على النص الكامل
-
293
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…The two movies are Wahed Tani which translates to (someone else) and Amahom which translate to (their uncle), Three datasets were employed, and several categorization models were compared across them. Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …"
احصل على النص الكامل
-
294
-
295
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
منشور في 2024"…It explores the application of Monte Carlo (MC) modelled medium dependency correction factors (K<sub>med</sub>) for accurate dose measurement in bone and lung materials using the CIRS phantom. …"
-
296
-
297
Graph Contraction for Mapping Data on Parallel Computers
منشور في 1994"…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
298
A kernelization algorithm for d-Hitting Set
منشور في 2010"…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
299
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
منشور في 2021"…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
-
300
Mapping realistic data sets on parallel computers
منشور في 1993"…The GC algorithm allows large-scale mapping to become efficient, especially when slow but high-quality mappers are used.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject