بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
621
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …"
-
622
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
منشور في 2019"…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
623
Combined cycle gas turbine system optimization for extended range electric vehicles
منشور في 2020"…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
624
An automated temporal partitioning tool for a class of DSP applications
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
625
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). Major companies' performance depends on well-designed IIoT infrastructure, despite significant challenges. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
626
-
627
-
628
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. Subsequently, we used our best-performing model, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model that achieved an area under the receiver operating characteristic curve (AUC) score of 0.983 to detect toxicity. …"
-
629
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
630
-
631
-
632
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
منشور في 2006"…Simulated Evolution (SE) a general iterative heuristic is used to traverse the large search space, while fuzzy logic is resorted to assist in multi-criteria decision making and overcome the imprecise nature of design information at placement stage. …"
احصل على النص الكامل
article -
633
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). Major companies' performance depends on well-designed IIoT infrastructure, despite significant challenges. …"
-
634
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"
-
635
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
منشور في 2024"…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
-
636
Development of multivariable PID controller gains in presence of measurement noise
منشور في 2017"…This paper examines the ability of a multivariable PID controller rejecting measurement noise without the use of any external filter. The work first provides a framework for the design of the PID gains comprising of necessary and sufficient conditions for boundedness of trajectories and zero-error convergence in presence of measurement noise. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
637
-
638
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
منشور في 2015"…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …"
-
639
-
640
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"