Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
-
181
Towards a Unified Arabic Government Services Chatbot Based on Ontology
Published 2020“…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
Get full text
-
182
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
183
An Efficient Prediction System for Diabetes Disease Based on Deep Neural Network
Published 2021“…Such algorithms are state‐of‐the‐art in computer vision, language processing, and image analysis, and when applied in healthcare for prediction and diagnosis purposes, these algorithms can produce highly accurate results. …”
-
184
Communication-Based Adaptive Overcurrent Protection for Distribution Systems with DistributedGenerators
Published 2012Get full text
doctoralThesis -
185
Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation
Published 2021“…The analytical model is derived based on the Euler-Bernoulli model. The Optimal location of the collocated sensor-actuator, as well as PID controller gains, are determined using Ant Colony Optimization (ACO) technique, then compared with the Genetic Algorithm (GA) and enumerative method (EM). …”
-
186
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
187
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
188
A combinatorial auction‐based approach for ridesharing in a student transportation system
Published 2023“…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …”
-
189
Analysis of power system stability enhancement via excitation and FACTS-based stabilizers
Published 2004“…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …”
Get full text
article -
190
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
191
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
192
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …”
-
193
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
-
194
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
195
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
Published 2020“…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
-
196
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
-
197
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
Published 2025Get full text
doctoralThesis -
198
Correlation Clustering with Overlaps
Published 2020“…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
199
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
Published 2024“…The DDPG algorithm can adapt to channel variations due to user movement and high-dimensional factors. …”
-
200
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”