بدائل البحث:
modelling algorithm » scheduling algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
modelling algorithm » scheduling algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
181
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
182
-
183
Degree-Based Network Anonymization
منشور في 2020"…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
184
A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm
منشور في 2023"…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …"
-
185
Geographical Area Network—Structural Health Monitoring Utility Computing Model
منشور في 2019"…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …"
-
186
-
187
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
منشور في 2019"…The results suggest that the proposed algorithm, the optimal Kalman filter, performs well in modeling acoustically activated drug release from liposomes.…"
احصل على النص الكامل
article -
188
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
189
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
منشور في 2022"…Nowadays, learning-based modeling methods are utilized to build a precise forecast model for renewable power sources. …"
احصل على النص الكامل
-
190
-
191
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
منشور في 2021"…In the proposed FDD approach, named interval reduced kernel PCA (IRKPCA)-based Random Forest (IRKPCA-RF), the feature extraction and selection phase is performed using the IRKPCA models while the fault classification is ensured using the RF algorithm. …"
-
192
Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant
منشور في 2007"…The proposed algorithm has been applied to a heat exchanger data.…"
احصل على النص الكامل
احصل على النص الكامل
article -
193
-
194
-
195
Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models
منشور في 2024"…Additionally, the GRU-CNN hybrid model attained a notable accuracy of 90%. These findings establish the robustness and effectiveness of hybrid architectures in enhancing emotion recognition accuracy in Arabic speech data, presenting a novel approach for Arabic dialect sentiment analysis.…"
احصل على النص الكامل
-
196
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
منشور في 2023"…Several dataset analysis models are utilised to study the data diversity. Further, this study demonstrates the application of neural network-based models to effectively predict the permeability. …"
-
197
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
198
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
199
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
-
200