بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
81
Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives
منشور في 2005"…The proposed GFLC is developed to have less computational burden, which makes it suitable for real-time implementation. The parameters for the GFLC are tuned by genetic algorithm (GA). …"
احصل على النص الكامل
article -
82
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
منشور في 2002"…We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
83
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …"
احصل على النص الكامل
article -
84
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
85
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
86
-
87
-
88
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
منشور في 2015احصل على النص الكامل
doctoralThesis -
89
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
90
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
منشور في 2018احصل على النص الكامل
doctoralThesis -
91
Analysis of Multi-User-Based UAV System With Outdated CSI
منشور في 2024"…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …"
-
92
-
93
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
94
Simultaneous stabilisation of power systems using geneticalgorithms
منشور في 1997"…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
95
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
منشور في 2024"…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
-
96
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
97
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
98
A Survey of Data Clustering Techniques
منشور في 2023"…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
99
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …"
احصل على النص الكامل
article -
100
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …"
احصل على النص الكامل