بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
-
161
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
منشور في 2025"…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
162
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
163
Using machine learning to support students’ academic decisions
منشور في 2019"…This approach uses other students’ grades to make a prediction. This research tests and compares the performance of Decision Trees, Random Forests, Gradient-Boosted trees, and Deep Learning machine learning regression algorithms to predict student GPA. …"
احصل على النص الكامل
-
164
Modeling and Control of Nonlinear Systems Using Wavelet Networks
منشور في 2006احصل على النص الكامل
doctoralThesis -
165
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
منشور في 1996"…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …"
احصل على النص الكامل
احصل على النص الكامل
article -
166
CEAP
منشور في 2016"…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
167
Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier
منشور في 2023"…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …"
احصل على النص الكامل
احصل على النص الكامل
-
168
Random vector functional link network: Recent developments, applications, and future directions
منشور في 2023"…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …"
-
169
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
170
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …"
-
171
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
منشور في 2019"…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
172
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
173
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
منشور في 2025"…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …"
-
174
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
منشور في 2021"…In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …"
-
175
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …"
-
176
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
منشور في 2020احصل على النص الكامل
doctoralThesis -
177
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
178
Low Cost Autopilot Design Using Fuzzy Supervisory Control
منشور في 2005احصل على النص الكامل
doctoralThesis -
179
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
-
180
Fine-grain watermarking for intellectual property protection
منشور في 2019"…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …"