بدائل البحث:
post algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
develop » developed (توسيع البحث)
post algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
develop » developed (توسيع البحث)
-
101
-
102
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
103
-
104
Artificial intelligence-based methods for fusion of electronic health records and imaging data
منشور في 2022"…We searched Embase, PubMed, Scopus, and Google Scholar to retrieve relevant studies. After pre-processing and screening, we extracted data from 34 studies that fulfilled the inclusion criteria. …"
-
105
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
منشور في 2021"…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …"
احصل على النص الكامل
-
106
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
احصل على النص الكامل
-
107
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
احصل على النص الكامل
احصل على النص الكامل
-
108
-
109
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
منشور في 2019"…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
110
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
منشور في 2020"…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …"
-
111
-
112
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
منشور في 2025"…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
-
113
-
114
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
115
KNNOR: An oversampling technique for imbalanced datasets
منشور في 2021"…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
-
116
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
-
117
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
منشور في 2022"…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
-
118
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
منشور في 2024"…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …"
-
119
Spider monkey optimizations: application review and results
منشور في 2024"…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
احصل على النص الكامل
-
120
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
احصل على النص الكامل
article