بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
text » test (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
text » test (توسيع البحث)
-
141
An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling
منشور في 2016"…The work presented in thesis add to the existing literature in a proposing the use of a genetic algorithm uncertain approach to resource- scheduling in projects. …"
احصل على النص الكامل
-
142
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
منشور في 2021"…Initially, the optimization model and convergence characteristics of JAYA algorithm are carefully analyzed. …"
احصل على النص الكامل
-
143
Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma
منشور في 2019"…</p><h3>Methods</h3><p dir="ltr">We use a real EHR dataset comprising 11071 patients, to evaluate and compare CD interpretations from LSTM and BiLSTM models. …"
-
144
-
145
-
146
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
منشور في 2024"…It explores the application of Monte Carlo (MC) modelled medium dependency correction factors (K<sub>med</sub>) for accurate dose measurement in bone and lung materials using the CIRS phantom. …"
-
147
An L2 Gap Metric Identification Algorithm
منشور في 2020"…In this paper, an L2-gap metric identification algorithm is proposed. The algorithm uses a set of frequency response samples to come up with rational models so that the L2-gap between the observations and the identified model is minimized. …"
احصل على النص الكامل
article -
148
-
149
Metaheuristic Algorithm for State-Based Software Testing
منشور في 2018"…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
150
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
منشور في 2023"…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …"
-
151
-
152
-
153
-
154
-
155
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
منشور في 2023"…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
-
156
Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control
منشور في 2021"…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. …"
-
157
Fuzzy simulated evolution algorithm for topology design of campusnetworks
منشور في 2000"…We present an approach based on the simulated evolution algorithm for the design of campus network topology. …"
احصل على النص الكامل
احصل على النص الكامل
article -
158
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
منشور في 2018"…Concerning DC bus voltage of the inverter, the anti-windup PI controller is tuned offline using the particle swarm optimization algorithm to deliver optimal performance in DC bus voltage regulation. …"
-
159
-
160
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …"