بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
pre processing » _ processing (توسيع البحث), image processing (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
pre processing » _ processing (توسيع البحث), image processing (توسيع البحث)
-
121
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
122
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…<div><p>This paper presents the optimization of fuel cost, emission of NOX, COX, and SOX gases caused by the generators in a thermal power plant using penalty factor approach. …"
-
123
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…In contrast to traditional approaches on this topic, this dissertation seeks to analyze the depth of users’ engagement with social media posts and discuss the basis for a predictive model that to predict the total engagement of a post before publishing. At the beginning, a data set was collected from Crowdbabble online tool and the collected dataset presented different periods and different social media networks to examine the user behavior at different times. …"
احصل على النص الكامل
-
124
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
125
-
126
-
127
-
128
Scatter search for protein structure prediction. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
129
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…<p dir="ltr">This paper presents a privacy persevering framework for a decentralized stock exchange platform, ensuring anonymity and unlinkability of the investors’ accounts and their respective trading activities. …"
-
130
-
131
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
منشور في 2021"…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …"
-
132
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
منشور في 2022"…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …"
-
133
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
منشور في 2021"…A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …"
احصل على النص الكامل
احصل على النص الكامل
-
134
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
منشور في 2021"…We also present a set of best practices to follow to obtain high-quality data from these low-cost sensors.…"
-
135
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
-
136
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …"
-
137
-
138
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
139
-
140
A synchronous/asynchronous multi-master replication method. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis