بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
-
101
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …"
احصل على النص الكامل
article -
102
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
103
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
104
FarmTech: Regulating the use of digital technologies in the agricultural sector
منشور في 2023"…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …"
-
105
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
106
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …"
-
107
Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications
منشور في 2023"…The review paper will be helpful for the researchers and practitioners of GBO belonging to a wide range of audiences from the domains of optimization, engineering, medical, data mining and clustering. As well, it is wealthy in research on health, environment and public safety. …"
احصل على النص الكامل
-
108
-
109
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …"
-
110
Large-scale annotation dataset for fetal head biometry in ultrasound images
منشور في 2023"…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…"
-
111
-
112
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
منشور في 2022"…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …"
-
113
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
منشور في 2020"…The data has not been investigated to the extent that such analysis can support decision-making or revenue/budget forecasting. …"
احصل على النص الكامل
-
114
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
115
-
116
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
117
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
118
-
119
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
120
Boosting the visibility of services in microservice architecture
منشور في 2023"…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"