بدائل البحث:
boosting algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
boosting algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
-
61
A data envelopment analysis model for opinion leaders’ identification in social networks
منشور في 2024"…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
-
62
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
63
-
64
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
منشور في 2020"…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
65
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
منشور في 2025"…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
-
66
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
67
-
68
-
69
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
70
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
منشور في 2022"…The classification performance is determined via different metrics for various GA-based ANN classifiers using data extracted from the healthy and faulty data of the GCPV system. …"
-
71
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
منشور في 2016"…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
72
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …"
احصل على النص الكامل
article -
73
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
74
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
75
FarmTech: Regulating the use of digital technologies in the agricultural sector
منشور في 2023"…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …"
-
76
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
77
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …"
-
78
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
79
-
80
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …"