بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
-
121
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
منشور في 2022"…The fittest dwarf mongoose is selected as the alpha, and a new operator ω is introduced, which controls the alpha movement, thereby enhancing the exploration ability and exploitability of the IDMO. …"
احصل على النص الكامل
-
122
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
منشور في 2018احصل على النص الكامل
doctoralThesis -
123
Analysis of Multi-User-Based UAV System With Outdated CSI
منشور في 2024"…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …"
-
124
-
125
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
126
Simultaneous stabilisation of power systems using geneticalgorithms
منشور في 1997"…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
127
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
128
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
منشور في 2024"…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
-
129
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
130
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
131
A Survey of Data Clustering Techniques
منشور في 2023"…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
132
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …"
احصل على النص الكامل
article -
133
-
134
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …"
احصل على النص الكامل
-
135
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
136
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
137
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
138
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
منشور في 2020"…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …"
-
139
-
140