بدائل البحث:
development based » development a (توسيع البحث), development level (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
development based » development a (توسيع البحث), development level (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
221
-
222
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
223
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
منشور في 2010احصل على النص الكامل
doctoralThesis -
224
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
منشور في 2024احصل على النص الكامل
doctoralThesis -
225
Optimizing MPPT Control for Enhanced Efficiency in Sustainable Photovoltaic Microgrids: A DSO-Based Approach
منشور في 2024"…Lastly, an MPPT system interfaced with the DC microgrid based on DSO ensures a sustainable and reliable architecture to provide at load in low power generating situations.…"
-
226
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…The embedded controller is microprocessor based, which provides the designer with the advantage of using a highly-integrated processor and the ability to develop the software needed…"
احصل على النص الكامل
احصل على النص الكامل
article -
227
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
228
A comparison of optimization heuristics for the data mapping problem
منشور في 1997"…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
229
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
230
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
منشور في 2021"…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …"
-
231
Correlation Clustering via s-Club Cluster Edge Deletion
منشور في 2023احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
232
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
منشور في 2022احصل على النص الكامل
doctoralThesis -
233
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …"
احصل على النص الكامل
article -
234
A fast exact sequential algorithm for the partial digest problem
منشور في 2016"…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
-
235
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
236
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
masterThesis -
237
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
منشور في 2024"…Among these, K-means is widely used for efficiently solving clustering problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
238
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
منشور في 2020"…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …"
احصل على النص الكامل
article -
239
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
منشور في 2020"…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …"
احصل على النص الكامل
article -
240
Second-order conic programming for data envelopment analysis models
منشور في 2022"…Data envelopment analysis (DEA) is a widely used benchmarking technique. …"
احصل على النص الكامل
احصل على النص الكامل