Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
tools using » tool using (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
tools using » tool using (Expand Search)
element » elements (Expand Search)
-
101
Platoon Transitional Maneuver Control System: A Review
Published 2021“…The most recent articles on platoon control maneuvers have been analyzed based on the proposed control algorithm, homogeneously or heterogeneously of platoon members, type of platoon maneuver, the aim of control problem, type of implementation, and used simulation tools. …”
-
102
-
103
Can AI Help in Screening Viral and COVID-19 Pneumonia?
Published 2020“…The main clinical tool currently in use for the diagnosis of COVID-19 is the Reverse transcription polymerase chain reaction (RT-PCR), which is expensive, less-sensitive and requires specialized medical personnel. …”
-
104
A dynamically turbo-charged heuristic for graph coloring. (c2018)
Published 2018Get full text
Get full text
Get full text
masterThesis -
105
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
106
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
Published 2022“…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
-
107
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
108
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
-
109
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.</p><h2>Other Information</h2> <p> Published in: Data Mining and Knowledge Discovery<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1007/s10618-020-00708-6" target="_blank">http://dx.doi.org/10.1007/s10618-020-00708-6</a></p>…”
-
110
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
Published 2014“…After reviewing the mechanism of GFT, a sample application to measure the CRM performance analysis was used as a vehicle to demonstrate the technique. A generic tool termed as Fuzzy Inference Engine (FIE) was built to demonstrate the multivariable modular approach used to implement the CRM performance measurement.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
111
-
112
Boosting the visibility of services in microservice architecture
Published 2023“…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
-
113
Correlation Clustering with Overlaps
Published 2020“…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
114
A system for sign language recognition using fuzzy object similarity tracking
Published 2005“…In this paper, we have presented a system that performs vision based isolated Arabic sign language recognition using hidden Markov models together with EM algorithm for parameters estimation. …”
Get full text
Get full text
article -
115
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. In order to label the data that was gathered from a corpus collection for ML use, manual annotation was made. …”
Get full text
-
116
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
Published 2017Get full text
doctoralThesis -
117
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
Published 2024Get full text
doctoralThesis -
118
Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System
Published 2021“…The model accuracy was validated with the results from different machine learning algorithms. The Accuracy, sensitivity, and specificity of the ANFIS model are 91.17±1.18%, 92±2.26%, 96.72±0.93%, respectively. …”
-
119
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…In order to benefit from multiple different classifiers, and exploit their strengths, the use of ensembling algorithms arises, which combine the results of the individual classifiers into a final result to achieve greater precision and thus a better result. …”
Get full text
-
120
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
Get full text
Get full text