بدائل البحث:
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
141
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
احصل على النص الكامل
-
142
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
143
Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends
منشور في 2024"…In addition, the possible minimum and maximum values of responses at the corresponding operating parameters are found using a genetic algorithm (GA) approach. Model 1 could capture the computational fluid dynamics (CFD) outputs with high precision at different flame radiuses and time instants with a maximum absolute error percentage of 5.46%. …"
-
144
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
منشور في 2023"…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. The ANN reliability is directly related to the success of the training process. …"
-
145
-
146
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …"
-
147
Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection
منشور في 2024"…<p>The increasing accessibility of extensive datasets has amplified the importance of extracting insights from high-dimensional data. However, the task of selecting relevant features in these high-dimensional spaces is made more difficult due to the curse of dimensionality. …"
-
148
Large-scale annotation dataset for fetal head biometry in ultrasound images
منشور في 2023"…The reliability of the annotations is verified through a two-step validation process involving a Senior Attending Physician and a Radiologic Technologist. …"
-
149
A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm
منشور في 2023"…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …"
-
150
-
151
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
منشور في 2020"…In order to model the uncertainty effects, a data-driven framework based on point estimate method and support vector machine is developed. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
152
-
153
-
154
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
منشور في 2020"…Various descriptive, diagnostic, predictive, and prescriptive analysis is done on the e-procurement data. The deep learning model developed can perform thousands of routine and, repetitive tasks within a fairly short period compared to what it would take for a human being without any compromise on the quality of work. …"
احصل على النص الكامل
-
155
-
156
-
157
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …"
-
158
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
159
Energy-aware adaptive compression for mobile devices. (c2009)
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
masterThesis -
160