بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
develop » developed (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
develop » developed (توسيع البحث)
-
661
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
منشور في 2019"…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …"
احصل على النص الكامل
احصل على النص الكامل
-
662
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…This article provides an updated review of the cutting-edge machine learning and data-driven techniques used for PGP in networked PSs. …"
-
663
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
-
664
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
منشور في 2023"…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"
-
665
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
منشور في 2018"…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
احصل على النص الكامل
-
666
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
منشور في 2016احصل على النص الكامل
doctoralThesis -
667
Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications
منشور في 2025"…</p><h3>Materials and methods</h3><p dir="ltr">An ensemble<u> species distribution modelling </u>approach, integrating regression-based and machine-learning algorithms (GLM, GBM, RF, MaxEnt), was used to project habitat suitability (Current time and by 2050, 2070, and 2090). …"
-
668
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this research, 143 research papers have been used for analysis which are providing security solutions towards IoT security issues. …"
-
669
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
670
Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration
منشور في 0000"…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
671
Positive Unlabelled Learning to Recognize Dishes as Named Entity
منشور في 2019"…I work with Yelp dataset, going through each text review, using each noun as a candidate, label the positive samples using the aforementioned lookup table, then using Positive Unlabelled learning techniques to recognise more entities within the unlabelled data, by predicting the probability for each candidate. …"
احصل على النص الكامل
-
672
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
673
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
منشور في 2024"…</p><h3>Objective</h3><p dir="ltr">In this paper, we propose a machine learning–based approach for identifying research gaps through the analysis of scientific literature. We used the COVID-19 pandemic as a case study.</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …"
-
674
Graph contraction for physical optimization methods
منشور في 1993"…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
675
Video features with impact on user quality of experience
منشور في 2021"…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
676
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
-
677
Optimizing ADWIN for Steady Streams
منشور في 2022"…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
678
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
منشور في 2009"…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
679
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
منشور في 2020"…Three years of data are used for model building and validation. …"
احصل على النص الكامل
article -
680
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article