بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element based » event based (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element based » event based (توسيع البحث)
-
161
-
162
Scatter search for protein structure prediction. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
163
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…<p dir="ltr">This paper presents a privacy persevering framework for a decentralized stock exchange platform, ensuring anonymity and unlinkability of the investors’ accounts and their respective trading activities. …"
-
164
-
165
Arabic Hotel Reviews Sentiment Analysis Using Deep Learning
منشور في 2023"…Our models utilized advanced text preprocessing, feature extraction, and classification algorithms to accurately predict sentiment polarity in Arabic hotel reviews. …"
احصل على النص الكامل
-
166
-
167
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
منشور في 2021"…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …"
-
168
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
منشور في 2015احصل على النص الكامل
doctoralThesis -
169
Analysis of Multi-User-Based UAV System With Outdated CSI
منشور في 2024"…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …"
-
170
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
منشور في 2020"…<p>This paper presents a design optimization algorithm for series-series compensated Inductive Power Transfer (IPT) system based on flat spiral coils, considering bifurcation phenomenon and AC equivalent resistance of the coils. …"
-
171
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
منشور في 2021"…We also present a set of best practices to follow to obtain high-quality data from these low-cost sensors.…"
-
172
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
-
173
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …"
-
174
-
175
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
منشور في 2024"…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
-
176
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
177
-
178
A synchronous/asynchronous multi-master replication method. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
179
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…"
-
180
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article