بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
search » research (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
search » research (توسيع البحث)
-
661
Novel hybrid informational model for predicting the creep and shrinkage deflection of reinforced concrete beams containing GGBFS
منشور في 2022"…After 150 days, the average creep deflection of RC beams containing 20, 40, and 60% GGBFS was 30, 70, and 100% higher than the ones for conventional concrete beams, respectively. A hybrid artificial neural network coupled with a metaheuristic Whale optimization algorithm has been developed to estimate the overall deflection of concrete beams due to creep and shrinkage. …"
-
662
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. In this paper, we develop a novel XML By example Generator (XBeGene) for producing synthetic XML data which closely reflect the user's requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
663
AI-based remaining useful life prediction and modelling of seawater desalination membranes
منشور في 2024احصل على النص الكامل
doctoralThesis -
664
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
665
AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients
منشور في 2015"…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…"
احصل على النص الكامل
احصل على النص الكامل
article -
666
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
667
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
668
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
منشور في 2019"…In this paper, we present an automatic tool that uses machine learning techniques to predict the development of type 2 diabetes mellitus (T2DM). Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …"
-
669
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
منشور في 2023"…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
احصل على النص الكامل
-
670
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
671
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…In the new era of digital communications, cyberbullying is a significant concern for society. Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
احصل على النص الكامل
-
672
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
منشور في 2019"…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …"
-
673
Multi-Objective Optimization for Food Availability under Economic and Environmental Risk Constraints
منشور في 2024"…Utilizing these assessments, a multi-objective optimization model is developed and solved using MATLAB (R2018a)’s Genetic Algorithm, aiming to identify optimal suppliers to meet Qatar’s food demand, with consideration of the economic, environmental, and risk factors. …"
-
674
-
675
LDSVM: Leukemia Cancer Classification Using Machine Learning
منشور في 2022"…PCA reduces the feature count without losing any information and deals with class imbalanced datasets, as well as faster model execution along with less computation cost. In this study, a novel process was used to reduce the column results to develop a faster and more rapid experiment execution.…"
-
676
Virtual Inertia Support in Power Systems for High Penetration of Renewables—Overview of Categorization, Comparison, and Evaluation of Control Techniques
منشور في 2022"…As a result, multiple inertia augmentation control strategies were developed to increase frequency stability and maximize power usage in the grid-integrated renewable energy systems. …"
-
677
-
678
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …"
-
679
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
680
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
منشور في 2023"…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"