بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element based » event based (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element based » event based (توسيع البحث)
-
141
Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study
منشور في 2022"…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
142
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
-
143
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…In this work, we also present damage assessment and recovery algorithms, and show the performance results.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
144
-
145
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
منشور في 2022"…While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…"
-
146
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
147
Optimized Load-Scheduling Algorithm for CubeSat's Electric Power System Management Considering Communication Link
منشور في 2023"…The most critical subsystem in CubeSats is the electrical power subsystem (EPS), which provides the required power to operate the remaining subsystems. This article presents an approach for optimizing load management and scheduling in CubeSat applications to ensure optimal coordination between the load demand, power generation, and energy storage while maintaining communication's quality of service requirements, namely the data rate and bit error rate (BER). …"
-
148
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
منشور في 2016"…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
149
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…Educational Data Mining (EDM) is the process of discovering information and relationships from educational data for better understanding of students’ performance, and characteristics of their education providers. …"
احصل على النص الكامل
-
150
Enhanced simulated evolution algorithm for digital circuit design yielding faster execution in a larger solution space
منشور في 2004"…Evolutionary algorithms have been studied by several researchers for the design of digital circuits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
151
-
152
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
153
Detecting sleep outside the clinic using wearable heart rate devices
منشور في 2022"…<p dir="ltr">The adoption of multisensor wearables presents the opportunity of longitudinal monitoring of sleep in large populations. …"
-
154
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…<div><p>This paper presents the optimization of fuel cost, emission of NOX, COX, and SOX gases caused by the generators in a thermal power plant using penalty factor approach. …"
-
155
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…In contrast to traditional approaches on this topic, this dissertation seeks to analyze the depth of users’ engagement with social media posts and discuss the basis for a predictive model that to predict the total engagement of a post before publishing. At the beginning, a data set was collected from Crowdbabble online tool and the collected dataset presented different periods and different social media networks to examine the user behavior at different times. …"
احصل على النص الكامل
-
156
-
157
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
158
-
159
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
160