بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
-
441
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis -
442
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
منشور في 2023"…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …"
-
443
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
444
Automation of the Arabic sign language recognition
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
article -
445
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
منشور في 2024احصل على النص الكامل
doctoralThesis -
446
Evacuation of a highly congested urban city
منشور في 2017"…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
447
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
448
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
449
Computer-aided detection of Melanoma using geometric features
منشور في 2017"…The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
450
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
451
High-order parametrization of the hypergeometric-Meijer approximants
منشور في 2023"…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …"
-
452
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
453
Generic metadata representation framework for social-based event detection, description, and linkage
منشور في 2020"…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
454
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
455
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
منشور في 2022"…This paper presents a deep learning approach to forecast the cumulative number of COVID-19 cases using bidirectional Long Short-Term Memory (Bi-LSTM) network applied to multivariate time series. …"
-
456
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
457
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
منشور في 2006"…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
458
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
459
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
منشور في 2019"…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
460
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
منشور في 2024"…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
احصل على النص الكامل