Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
101
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
102
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
Get full text
-
103
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…The lamb wave signals for interrogating the plate structure are obtained using experiments and a sparse array of four piezoelectric wafer (PW) transducers. …”
Get full text
-
104
-
105
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
106
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
107
-
108
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
109
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
Published 2024“…Thus, the shortcomings of wet lab experiments are leveraged by computational methods to accurately predict the functional types of DPs. …”
-
110
-
111
-
112
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
113
-
114
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. …”
-
115
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
116
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
Published 2024“…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …”
-
117
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…All the experiments were conducted using the pitch-catch method in presence of surface damages on head of the Rail track. …”
Get full text
-
118
-
119
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
120
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…Experiments and simulations demonstrate the relevance and efficiency of our approach compared to other recent techniques in the literature.…”
Get full text
Get full text
Get full text
Get full text
article