بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
machine algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
machine algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
-
421
-
422
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
منشور في 2021"…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …"
-
423
-
424
-
425
Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter
منشور في 2023"…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …"
-
426
-
427
-
428
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …"
-
429
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
منشور في 2022"…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …"
-
430
-
431
-
432
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …"
احصل على النص الكامل
-
433
-
434
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …"
احصل على النص الكامل
-
435
CEAP
منشور في 2016"…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
436
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
437
-
438
Competitive learning/reflected residual vector quantization for coding angiogram images
منشور في 2003"…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
article -
439
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
440
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
منشور في 2018"…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
احصل على النص الكامل