بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
-
201
-
202
-
203
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
منشور في 2010احصل على النص الكامل
doctoralThesis -
204
A Comparative Study of RSA based Cryptographic Algorithms
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
205
Simultaneous stabilisation of power systems using geneticalgorithms
منشور في 1997"…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
article -
206
Optimal Management of Mobile Energy Generation and Storage Systems
منشور في 2018احصل على النص الكامل
doctoralThesis -
207
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
منشور في 2018"…Patients’ feedback on the messages and their interactions with the app will be analyzed and evaluated following an observational prospective methodology to a) assess the perceived quality of the mobile-based health recommender system and the messages, using the precision and time-to-read metrics and an 18-item questionnaire delivered to all patients who complete the program, and b) measure patient engagement with the mobile-based health recommender system using aggregated data analytic metrics like session frequency and, to determine the individual-level engagement, the rate of read messages for each user. …"
-
208
Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates
منشور في 2020"…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
احصل على النص الكامل
article -
209
-
210
Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Algorithm
منشور في 2023"…The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …"
-
211
-
212
-
213
The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers
منشور في 2021"…The optimization of the system parameters is expected to overcome the limitations of using evaporative coolers in humid countries. …"
-
214
-
215
A Novel Fault Diagnosis of Uncertain Systems Based on Interval Gaussian Process Regression: Application to Wind Energy Conversion Systems
منشور في 2020"…Thus, this paper proposes a novel Interval Gaussian Process Regression (IGPR)-based Random Forest (RF) technique (IGPR-RF) for diagnosing uncertain WEC systems. In the proposed IGPR-RF technique, the effective interval-valued nonlinear statistical features are extracted and selected using the IGPR model and then fed to the RF algorithm for fault classification purposes. …"
-
216
-
217
A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System
منشور في 2021"…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …"
-
218
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
منشور في 2023"…Radiological images (14/30, 47%) were the most frequently used data in the included articles. Most of the included articles used data sets with a size of <1000 samples (11/30, 37%). …"
-
219
Malicious URL and Intrusion Detection using Machine Learning
منشور في 2024"…Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). …"
احصل على النص الكامل
article -
220