بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
781
A new deadlock recovery mechanism for fully adaptive routingalgorithms
منشور في 2000"…Routing algorithms used in wormhole switched networks must all provide a solution to the deadlock problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
782
Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose
منشور في 2020"…In this paper, these two problems of `sensors long term drift' and `delayed response' are solved simultaneously to propose a robust and fast electronic nose system, with following merits: (i) only initial transient state features are used in the proposed system without waiting for the sensors to reach a steady state, (ii) a modified boxplot approach is used to handle noisy/drifted data points as a preprocessing step before the classification setup, (iii) a heuristic tree classification approach with optimized transient features is proposed, (iv) the proposed approach only relies on adapted ML methods contrary to the traditional approaches like system recalibration or sensors replacement for handling sensors drift, and (v) the proposed ML model does not require any target domain data and uses only the source domain data for learning the classifier, opposed to the other ML solutions available in the existing literature. …"
-
783
Genetic Fuzzimetric Technique (GFT)
منشور في 2012"…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
784
Optimal supercharge scheduling of electric vehicles
منشور في 2018"…At first, a centralized optimization framework is formulated using an integer linear problem (ILP) that accounts for the delayed arrival of EVs to CSs and the randomness in the requested recharge time interval. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
785
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
-
786
Adaptive Chip-Level Channel Estimation for IMT-DS System: DL and UL
منشور في 2005"…In this paper, chip-level adaptive channel estimation has been explored by using LMS algorithm for wideband CDMA channel estimation. …"
احصل على النص الكامل
article -
787
Design of a vibration absorber for harmonically forced damped systems
منشور في 2013"…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
788
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
منشور في 2020"…An algorithm is also proposed to find the optimal solutions to the problem at hand. …"
احصل على النص الكامل
article -
789
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
790
A modified optimal design of a vibration absorber for ground motion isolation
منشور في 2014"…Recently, a new vibration absorber setup was proposed where the absorber is placed between the dynamic system and its moving support. The problem was solved and design guidelines were proposed using the classical absorber design technique. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
791
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
منشور في 2017احصل على النص الكامل
doctoralThesis -
792
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …"
-
793
A new estimator and approach for estimating the subpopulation parameters
منشور في 2021"…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
-
794
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
منشور في 2014احصل على النص الكامل
doctoralThesis -
795
A novel network-based SIS framework for improved GA performance
منشور في 2025"…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
796
-
797
A Machine Learning Approach to Predicting Diabetes Complications
منشور في 2021احصل على النص الكامل
doctoralThesis -
798
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
799
A neuro-heuristic approach for segmenting handwritten Arabic text. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
800
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"