بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
-
221
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
منشور في 2024احصل على النص الكامل
doctoralThesis -
222
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
223
A high-performance toolkit for fast exact algorithms
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
224
An Algorithm For Computing The Distance Between Two Circular Disks
منشور في 2020"…A Kurush-Kuhn-Tucker (KKT) approach is used to solve the problem. We show that when the optimal points are not both at the borders of disks, the solutions of the KKT equations can be obtained in closed-form. …"
احصل على النص الكامل
article -
225
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
منشور في 2025"…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …"
-
226
A direct algorithm for the parameterized face cover problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
227
-
228
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
229
A comparison of optimization heuristics for the data mapping problem
منشور في 1997"…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
230
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
231
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
منشور في 2020احصل على النص الكامل
doctoralThesis -
232
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
منشور في 2020"…This paper demonstrates the use of genetic algorithms to design a single output feedback control law for the simultaneous eigenvalue placement of a power system running over a wide range of operating conditions. …"
احصل على النص الكامل
article -
233
A comparative study of RSA based digital signature algorithms
منشور في 2006"…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
234
A Simulated Annealing Algorithm For Fuzzy Unit Commitment Problem
منشور في 2020"…This paper presents a new algorithm based on integrating simulated annealing and fuzzy logic methods to solve the unit commitment problem. …"
احصل على النص الكامل
article -
235
A simulated annealing algorithm for fuzzy unit commitment problem
منشور في 1999"…This paper presents a new algorithm based on integrating simulated annealing and fuzzy logic methods to solve the unit commitment problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
236
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
منشور في 2020"…The performance of the Tabu search algorithm is promising. The Tabu search algorithm solved two power system problems, 4 units and 22 units. …"
احصل على النص الكامل
article -
237
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
منشور في 2020"…The performance of the Tabu search algorithm is promising. The Tabu search algorithm solved two power system problems, 4 units and 22 units. …"
احصل على النص الكامل
article -
238
Second-order conic programming for data envelopment analysis models
منشور في 2022"…Data envelopment analysis (DEA) is a widely used benchmarking technique. …"
احصل على النص الكامل
احصل على النص الكامل
-
239
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
منشور في 2022احصل على النص الكامل
doctoralThesis -
240
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …"
احصل على النص الكامل
article