بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
141
-
142
-
143
-
144
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
منشور في 2022"…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …"
-
145
Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control
منشور في 2021"…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …"
-
146
-
147
Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study
منشور في 2022"…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
148
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
منشور في 2023"…To address these challenges, we introduce VacoNet: a new flexible data center network topology that organizes nodes into structurally similar clusters, interconnected by a novel physical structure algorithm. …"
-
149
-
150
-
151
-
152
A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms
منشور في 2007"…This thesis develops a reconfigurable architecture capable of implementing most symmetric-key as well as asymmetric-key ciphers. …"
احصل على النص الكامل
masterThesis -
153
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
منشور في 2025"…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …"
-
154
A distributed genetic algorithm for deterministic and stochastic labor scheduling problems
منشور في 1999"…Our distributed genetic algorithm operates in parallel on a network of message-passing workstations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
155
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
156
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …"
احصل على النص الكامل
-
157
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
158
Stacking-based ensemble learning for remaining useful life estimation
منشور في 2023"…In this study, predictive models that estimate the remaining useful life of turbofan engines have been developed using deep learning algorithms on NASA’s turbofan engine degradation simulation dataset. …"
-
159
A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text
منشور في 2019"…The previously published research on Arabic ontology learning from text falls into three categories: developing manually hand-crafted rules, using ordinary supervised/unsupervised machine learning algorithms, or a hybrid of these two approaches. …"
احصل على النص الكامل
احصل على النص الكامل
-
160
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
منشور في 2022"…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"