بدائل البحث:
developing robust » developing 21st (توسيع البحث)
robust algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
developing robust » developing 21st (توسيع البحث)
robust algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
-
581
Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d...
منشور في 2020"…<h3>Objective</h3><p dir="ltr">To develop a machine-based algorithm from clinical and demographic data, physical activity and glucose variability to predict hyperglycaemic and hypoglycaemic excursions in patients with type 2 diabetes on multiple glucose lowering therapies who fast during Ramadan.…"
-
582
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
منشور في 2023"…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …"
-
583
Uplink Noma in UAV-Assisted IoT Networks
منشور في 2022"…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
584
Anonymizing multimedia documents
منشور في 2016"…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
585
MoveSchedule
منشور في 1995"…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
586
Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends
منشور في 2024"…In addition, the possible minimum and maximum values of responses at the corresponding operating parameters are found using a genetic algorithm (GA) approach. Model 1 could capture the computational fluid dynamics (CFD) outputs with high precision at different flame radiuses and time instants with a maximum absolute error percentage of 5.46%. …"
-
587
-
588
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
منشور في 2019"…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
589
Active distribution network type identification method of high proportion new energy power system based on source-load matching
منشور في 2023"…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
590
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
منشور في 2023"…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
591
Anomaly Detection Based Framework for Profile Monitoring
منشور في 2023احصل على النص الكامل
doctoralThesis -
592
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
منشور في 2022"…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
-
593
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …"
-
594
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
595
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
596
Implementation of trust region methods in optimization. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
597
Dataset built for Arabic Sentiment Analysis
منشور في 2016"…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
احصل على النص الكامل
-
598
Inferential sensing techniques in industrial applications
منشور في 0007"…Real data from a boiler plant is used to develop the model. …"
احصل على النص الكامل
masterThesis -
599
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …"
-
600
Bootstrap-based Aggregations and their Stability in Feature Selection
منشور في 2022احصل على النص الكامل
doctoralThesis