بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
point algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
point algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
221
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
222
-
223
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
منشور في 2010"…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
224
The buffered work-pool approach for search-tree based optimization algorithms
منشور في 2017"…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
225
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
-
226
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
منشور في 2023"…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …"
-
227
-
228
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …"
-
229
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …"
-
230
LaScaDa: A Novel Scalable Topology for Data Center Network
منشور في 2020"…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …"
-
231
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
232
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
منشور في 2019"…The global evolution of wireless technologies and intelligent sensing devices are transforming the realization of smart cities. Among the myriad of use cases, there is a need to support applications whereby low-resource Internet of Things (IoT) devices need to upload their sensor data to a remote control centre by target hard deadlines; otherwise, the data becomes outdated and loses its value, for example, in emergency or industrial control scenarios. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
233
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
منشور في 2020"…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …"
-
234
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
احصل على النص الكامل
-
235
-
236
-
237
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
238
-
239
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
240
A data envelopment analysis model for opinion leaders’ identification in social networks
منشور في 2024"…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"