بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
level using » level fusion (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
level using » level fusion (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
181
-
182
Using artificial intelligence to improve body iron quantification: A scoping review
منشور في 2023"…The search revealed a wide range of machine learning algorithms used by different studies. Notably, most studies used a single data type. …"
-
183
-
184
Efficiency Optimization of a DSP-Based Standalone PV System Using Fuzzy Logic and Dual-MPPT Control
منشور في 2012"…The first MPPT controller is an astronomical two-axis sun tracker, which is designed to track the sun over both the azimuth and elevation angles and obtain maximum solar radiation at all times. The second MPPT algorithm controls the power converter between the PV panel and the load and implements a new fuzzy-logic (FLC)-based perturb and observe (P&O) scheme to keep the system power operating point at its maximum. …"
احصل على النص الكامل
article -
185
Modeling of Chlorophyll-a and Eutrophication Indicators in the Dubai Creek Area using Remote Sensing
منشور في 2015احصل على النص الكامل
doctoralThesis -
186
Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System
منشور في 2021"…The proposed classifier was used to classify the Epidemiology of Diabetes Interventions and Complications (EDIC) clinical trial patients and observed that in the first, eighth, and nineteenth EDIC years 18.31%, 39.45%, and 59.14% patients had different levels of DSPN. …"
-
187
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
188
-
189
Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation
منشور في 2019"…<p dir="ltr">In this paper, space vector pulse width modulation (SVPWM)-based algorithms for a five-phase open-end load fed from dual matrix converter (DMC) have been proposed. …"
-
190
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
منشور في 2024"…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …"
-
191
On the exact recovery of the FFT of noisy signals using a non-subtractively dither-quantized input channel
منشور في 2003"…Through several algorithmic changes, the FFT and its variants have not only breathed a new lease of life into an otherwise latent classical DFT algorithm but also led to an explosion of applications in numerous areas. …"
احصل على النص الكامل
احصل على النص الكامل
article -
192
Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques
منشور في 2025"…The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …"
-
193
Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma
منشور في 2019"…We extend the method to bidirectional LSTMs (BiLSTMs) and use it in the context of predicting future clinical outcomes using patients’ EHR historical visits.…"
-
194
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
منشور في 2024"…Advanced machine learning algorithms are used in this study to figure out the complicated relationship between the crashworthiness parameters of the hexagonal composite ring specimens under lateral compressive, energy absorption, and failure modes. …"
-
195
-
196
Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods
منشور في 2022"…From the results, it is found that the Levenberg–Marquardt optimization algorithm-based ANN model gives the best electrical load forecasting results.…"
-
197
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
-
198
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
منشور في 2019"…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …"
-
199
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…The main purpose is to bridge the gap between EDM and International Assessments in the Arab world by applying EDM to predict Grade-4 student levels in TIMSS assessments in the UAE. We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
احصل على النص الكامل
-
200
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article