بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
261
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
منشور في 2020"…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
262
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
منشور في 2013"…We use this algorithm to build a sensor selection model to choose among location sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
263
A combinatorial auction‐based approach for ridesharing in a student transportation system
منشور في 2023"…The concept of ridesharing is used and the mechanism of combinatorial auctions is incorporated within a routing-based model. The mathematical model is based on the vehicle routing problem along with appropriate constraints accommodating features that express the auction clearing phase. …"
-
264
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…This study describes a method for identifying parameters associated with the power system model. In particular, the proposed algorithm in this study addresses the line parameter and topology identification task in the scope of state estimation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
265
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
منشور في 2025"…Three different publicly available datasets have been used based on the age group to create the best predicting model for each case. …"
-
266
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
منشور في 2023"…This paper presents a reinforcement learning agent-based model that works by incorporating the MESA environment with the Stone Soup radar systems simulator. …"
احصل على النص الكامل
-
267
A pragmatic approach for testing robustness on real-time component based systems
منشور في 2005"…In this paper, we suggest a realistic methodology for testing robustness of real-time component-based systems (RTCBS). A RTCBS system is described as a collection of components where each component is specified by a nominal and a degraded specification, modeled as a timed input-output automaton (TIOA). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
268
Generic metadata representation framework for social-based event detection, description, and linkage
منشور في 2020"…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
269
MSLP: mRNA subcellular localization predictor based on machine learning techniques
منشور في 2023"…</p><h3>Results</h3><p dir="ltr">Considering the combination of the above-mentioned features, ennsemble-based models achieved state-of-the-art results in mRNA subcellular localization prediction tasks for multiple benchmark datasets. …"
-
270
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
271
A heuristics for HTTP traffic identification in measuring user dissimilarity
منشور في 2020"…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …"
-
272
-
273
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
منشور في 2020"…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …"
-
274
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
منشور في 2025احصل على النص الكامل
doctoralThesis -
275
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
276
-
277
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
منشور في 2019"…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …"
-
278
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
منشور في 2019"…In this research, we present a novel data mining approach to predict retention among a homogeneous group of students, with similar social and cultural background, at an academic institution based in the UAE. Our model successfully identifes dropouts at an early stage. …"
احصل على النص الكامل
-
279
Correlation Clustering with Overlaps
منشور في 2020"…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
280
A new bi-objective model of the urban public transportation hub network design under uncertainty
منشور في 2019"…For medium and large-sized problems, a meta-heuristic algorithm, namely multi-objective particle swarm optimization is applied and its performance is compared with results from the non-dominated sorting genetic algorithm. …"