بدائل البحث:
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
finding » findings (توسيع البحث)
colony » colon (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
finding » findings (توسيع البحث)
colony » colon (توسيع البحث)
-
61
Theoretical Estimation of the Dispersion Curves in an Orthotropic Composite Plate
منشور في 2024"…In this work, root-finding using the bisection algorithm is proposed to solve the transcendental dispersion relations and evaluate the dispersion curves of ultrasonic-guided waves propagating in an orthotropic composite plate. …"
احصل على النص الكامل
-
62
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …"
-
63
Phased Array Technique for Brain Source Localization
منشور في 2012احصل على النص الكامل
doctoralThesis -
64
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
منشور في 2018"…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
احصل على النص الكامل
-
65
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
منشور في 2011احصل على النص الكامل
doctoralThesis -
66
-
67
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
منشور في 2023"…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"
-
68
Enhanced Microgrid Reliability Through Optimal Battery Energy Storage System Type and Sizing
منشور في 2023"…<p dir="ltr">Reliability plays a crucial role in the design and implementation of microgrids (MGs). The integration of battery energy storage systems (BESSs) with renewable energies has been proposed as a solution to enhance reliability. …"
-
69
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…Scientific advances in pile analysis have been made in recent decades but their implementation in the estimation of axial capacity has been slow. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
70
Performance Prediction Using Classification
منشور في 2019"…Principal component analysis and feature selection by weights using information gain ratio, Gini index, correlation and PCA is used to determine the relevant predictors of the datasets used. This study also addresses gaps in the current available literature on performance prediction, such as data imbalance and the use of Ensemble models. …"
احصل على النص الكامل
-
71
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
منشور في 2018"…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …"
-
72
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
منشور في 2024"…Missing data were imputed with principal component analysis. …"
-
73
An efficient method for the open-shop scheduling problem using simulated annealing
منشور في 2016"…Experimental results show that the algorithm performs well on the benchmarks. The algorithm was able to find an optimum solution in many cases.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
74
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
منشور في 2018"…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
75
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
منشور في 2015"…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
-
76
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
77
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
منشور في 2021"…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…"
-
78
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
-
79
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. We find this feature necessary in order to implement security hardening solutions that are infeasible or impractical using the current AOP proposals. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
80
The Effects of Data Mining on Small Businesses in Dubai
منشور في 2011"…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
احصل على النص الكامل