بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
based models » based modeling (توسيع البحث)
data model » data models (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
based models » based modeling (توسيع البحث)
data model » data models (توسيع البحث)
element » elements (توسيع البحث)
-
121
Hybrid Deep Learning-based Models for Crop Yield Prediction
منشور في 2022"…In this study, we developed deep learning-based models to evaluate how the underlying algorithms perform with respect to different performance criteria. …"
-
122
-
123
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
124
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
125
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
126
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
127
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
منشور في 2023"…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"
-
128
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
منشور في 2024الموضوعات: -
129
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
130
-
131
Artificial intelligence-based methods for fusion of electronic health records and imaging data
منشور في 2022"…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …"
-
132
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
133
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
-
134
-
135
Degree-Based Network Anonymization
منشور في 2020"…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
136
Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm?
منشور في 2021"…The resulting model achieves an 89% predictive accuracy using historical data. …"
-
137
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
منشور في 2023"…Several dataset analysis models are utilised to study the data diversity. Further, this study demonstrates the application of neural network-based models to effectively predict the permeability. …"
-
138
AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques
منشور في 2023"…This paper proposes a novel automated algorithm for the health monitoring of concrete column base cover degradation based on IoT and the state-of-the-art deep learning framework, Convolutional Neural Network (CNN). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
139
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
منشور في 2018"…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …"
-
140
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. As it is considered one of the most open and scalable interacting platforms of information, it successfully helps in the positive transfer of different kinds of data between devices in more significant and local operations of the industry. …"