بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
161
Condenser capacity and hyperbolic perimeter
منشور في 2022"…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
-
162
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …"
-
163
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
منشور في 2019"…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…"
-
164
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
165
Diagnosing failed distribution transformers using neural networks
منشور في 2001"…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. The diagnosis was based on the latest standards and expert experiences in this field. …"
احصل على النص الكامل
احصل على النص الكامل
article -
166
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
منشور في 2015"…In the end, an experiment was conducted over datasets collected from different timeframes to see what are the constant hot topics discussed in Twitter about Dubai. …"
احصل على النص الكامل
-
167
SemIndex: Semantic-Aware Inverted Index
منشور في 2017"…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
168
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
منشور في 2009احصل على النص الكامل
doctoralThesis -
169
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
منشور في 2019"…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …"
-
170
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
احصل على النص الكامل
-
171
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
منشور في 2025"…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…"
-
172
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
173
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
174
Internal Model Control Structure Using Adaptive Inverse Control Strategy
منشور في 2003"…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …"
احصل على النص الكامل
احصل على النص الكامل
article -
175
-
176
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
177
Novel biomarkers for potential risk stratification of drug induced liver injury (DILI)
منشور في 2019"…</p><h3>Methods:</h3><p dir="ltr">We explored PUBMED and all other relevant databases for scientific studies that explored potential utility of novel biomarkers of DILI, and subsequently carried out a narrative synthesis of this data. …"
-
178
Approximate XML structure validation technical report
منشور في 2014"…We implemented a prototype and conducted several experiments on large sets of real and synthetic XML documents and grammars. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
179
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
احصل على النص الكامل
-
180
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
احصل على النص الكامل