بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
-
141
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
منشور في 2021"…A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …"
احصل على النص الكامل
احصل على النص الكامل
-
142
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
-
143
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …"
-
144
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. The state-of-the-art output from streaming confor mance checking is a prefix-alignment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
145
-
146
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
147
Correlation Clustering with Overlaps
منشور في 2020"…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
148
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
-
149
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …"
احصل على النص الكامل
-
150
-
151
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
منشور في 2019"…Linear classification and several machine algorithms were trained and tested for real-time application. …"
-
152
-
153
-
154
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
منشور في 2017احصل على النص الكامل
doctoralThesis -
155
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. This model can be used in a clinical setting as a decision support system or for public health awareness as an informal risk prediction system. …"
احصل على النص الكامل
-
156
-
157
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
158
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
منشور في 2019احصل على النص الكامل
doctoralThesis -
159
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …"
-
160
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
منشور في 2025احصل على النص الكامل
doctoralThesis