بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
-
181
-
182
-
183
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
184
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
185
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
منشور في 2023"…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
-
186
A heuristics for HTTP traffic identification in measuring user dissimilarity
منشور في 2020"…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …"
-
187
-
188
A combinatorial auction‐based approach for ridesharing in a student transportation system
منشور في 2023"…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …"
-
189
Analysis of power system stability enhancement via excitation and FACTS-based stabilizers
منشور في 2004"…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …"
احصل على النص الكامل
article -
190
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
191
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
منشور في 2019"…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …"
-
192
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
منشور في 2020"…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …"
-
193
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
منشور في 2025احصل على النص الكامل
doctoralThesis -
194
AI-based remaining useful life prediction and modelling of seawater desalination membranes
منشور في 2024احصل على النص الكامل
doctoralThesis -
195
-
196
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …"
-
197
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
198
Minimizing using BBO and DFO methods
منشور في 2022"…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
199
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …"
-
200
Boosting the visibility of services in microservice architecture
منشور في 2023"…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"