بدائل البحث:
sharing algorithm » learning algorithms (توسيع البحث), search algorithm (توسيع البحث), swarm algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
data sharing » data hiding (توسيع البحث)
element » elements (توسيع البحث)
sharing algorithm » learning algorithms (توسيع البحث), search algorithm (توسيع البحث), swarm algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
data sharing » data hiding (توسيع البحث)
element » elements (توسيع البحث)
-
61
Prediction of EV Charging Behavior Using Machine Learning
منشور في 2021"…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …"
احصل على النص الكامل
article -
62
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
63
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
64
-
65
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
منشور في 2021"…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …"
-
66
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
احصل على النص الكامل
-
67
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
68
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
69
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
70
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
منشور في 2022"…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …"
-
71
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
منشور في 2020"…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …"
-
72
-
73
Correlation Clustering with Overlaps
منشور في 2020"…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
74
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
منشور في 2025"…<p dir="ltr">Federated learning has emerged as a prominent privacy-preserving technique for leveraging large-scale distributed datasets by sharing gradients instead of raw data. However, recent studies indicate that private training data can still be exposed through gradient inversion attacks. …"
-
75
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
منشور في 2025"…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …"
-
76
-
77
Evacuation of a highly congested urban city
منشور في 2017"…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
78
Anonymizing multimedia documents
منشور في 2016"…Such data sharing puts at risk the privacy of individuals, whose identities need to be kept secret, when adversaries get the ability to associate the multimedia document’s content to possible trail of information left behind by the individual. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
79
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
منشور في 2017"…One of the critical concerns in the current era is information security. Companies are sharing vast online critical data, which exposes their databases to malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
80
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article