بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
encoding algorithm » cosine algorithm (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
-
341
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
احصل على النص الكامل
-
342
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
343
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
منشور في 2018"…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …"
احصل على النص الكامل
-
344
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
منشور في 2020"…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
-
345
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
346
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
347
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
منشور في 2022"…Additionally, we evaluate the performance of the best developed model with children. Machine learning algorithms experiments showed that XGBoost achieved the best performance across all metrics (e.g., accuracy of 90%) and provided fast predictions (i.e., 0.004 s) for the test samples. …"
-
348
CEAP
منشور في 2016"…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
349
Query acceleration in distributed database systems
منشور في 2001"…Query optimization strategies aim to minimize the cost of transferring data across networks. Many techniques and algorithms have been proposed to optimize queries. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
350
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
منشور في 2025"…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …"
احصل على النص الكامل
-
351
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…"
-
352
Vibration suppression in a cantilever beam using a string-type vibration absorber
منشور في 2017"…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
353
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
354
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …"
-
355
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
-
356
-
357
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
منشور في 2016احصل على النص الكامل
doctoralThesis -
358
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…We build our model using machine learning techniques in particular rule-based models. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
359
-
360
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article