Search alternatives:
spatial scheduling » optimal scheduling (Expand Search)
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
spatial scheduling » optimal scheduling (Expand Search)
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
361
-
362
Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models
Published 2023“…The study of thoughts, feelings, judgments, values, attitudes, and emotions regarding goods, services, organizations, persons, tasks, occasions, titles, and their attributes is known as sentiment analysis and it involves a polarity classification task for recognizing positive, negative, or neutral text to quantify what individuals believe using textual qualitative data. The rise of social media platforms provided an excellent source for sentiment analysis data. …”
Get full text
-
363
Modeling of Chlorophyll-a and Eutrophication Indicators in the Dubai Creek Area using Remote Sensing
Published 2015Get full text
doctoralThesis -
364
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
Get full text
Get full text
masterThesis -
365
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
-
366
-
367
A New Approach for Recognizing Saudi Arabian License Plates using Neural Networks
Published 2020“…Finally, a Multilayer Feedforward Neural Network (MFNN) with a backpropagation (BP) algorithm is used for character recognition. We discuss new features from the characters for training the NN. …”
Get full text
article -
368
Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry
Published 2016“…We present a new and fast method that blends altimetric and drifter positions data in order to predict the surface velocity in the Eastern Levantine Mediterranean. …”
Get full text
Get full text
Get full text
Get full text
article -
369
-
370
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
371
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
372
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
373
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
374
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
Published 2020“…The data is finally classified as either ransomware or goodware using the learning methodologies. …”
Get full text
-
375
-
376
-
377
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …”
-
378
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…In our research, we introduce a comprehensive approach to Arabic poetry text classification using deep learning techniques. We have used an almost one-million record dataset of Arabic poetry verses extracted from a poetry encyclopedia. …”
Get full text
-
379
Cognitive Load Estimation Using a Hybrid Cluster-Based Unsupervised Machine Learning Technique
Published 2024“…In this study, we harnessed the capabilities of a four-channel, wearable EEG device that captured brain activity data during two distinct CL states: Baseline (representing a non-CL, resting state) and the Stroop Test (a CL-inducing state). …”
-
380
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis