Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
421
Modeling of Chlorophyll-a and Eutrophication Indicators in the Dubai Creek Area using Remote Sensing
Published 2015Get full text
doctoralThesis -
422
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
Published 2023“…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …”
Get full text
-
423
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
424
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…The effect of surface area loading rate (SALR), organic matters (OMs), nutrients (N & P), feed flow rate (Q<sub>feed</sub>), hydraulic retention time (HRT), and internal recycle flow (IRF) on the performance of the ENR-BP to fulfil rigorous discharge limitations were evaluated. Experimental data was used to develop the appropriate architecture for the AAN using iterative steps of training and testing. …”
-
425
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
Published 2021“…In this regard, this paper is an in-depth review of existing anomaly detection frameworks for building energy consumption based on artificial intelligence. Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …”
-
426
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
427
-
428
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
429
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
Published 2020“…The data is finally classified as either ransomware or goodware using the learning methodologies. …”
Get full text
-
430
-
431
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”
-
432
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
Published 2025“…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
-
433
DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs
Published 2025“…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …”
-
434
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…In our research, we introduce a comprehensive approach to Arabic poetry text classification using deep learning techniques. We have used an almost one-million record dataset of Arabic poetry verses extracted from a poetry encyclopedia. …”
Get full text
-
435
Cognitive Load Estimation Using a Hybrid Cluster-Based Unsupervised Machine Learning Technique
Published 2024“…In this study, we harnessed the capabilities of a four-channel, wearable EEG device that captured brain activity data during two distinct CL states: Baseline (representing a non-CL, resting state) and the Stroop Test (a CL-inducing state). …”
-
436
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
437
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Moreover, it is faster and requires fewer parameters to train than other CNN based models, making it a good choice for large-scale deployment in clinical settings and a promising tool for automated lung cancer diagnosis from CT scan images.…”
-
438
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…The proposed ANN based algorithm has been used for unswerving petite term forecasting. …”
Get full text
-
439
HVAC system attack detection dataset
Published 2021“…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
-
440
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
Published 2024“…The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”