بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
-
161
-
162
KNNOR: An oversampling technique for imbalanced datasets
منشور في 2021"…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
-
163
-
164
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
-
165
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
166
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
منشور في 2022"…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
-
167
-
168
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
169
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. …"
-
170
-
171
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
منشور في 2022"…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. …"
-
172
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
احصل على النص الكامل
article -
173
-
174
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
175
-
176
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
177
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…To retrieve such information, the encrypted form must be first decrypted. One of the most popular cryptographic systems is the RSA system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
178
A control algorithm to increase the efficient operation of wind energy conversion systems under extreme wind conditions
منشور في 2022"…<p dir="ltr">This paper aims to increase the power production of gearless permanent magnet synchronous generator (PMSG) based wind energy conversion systems (WECS) in strong (greater than 25 m/s) wind speed regions. In general, most wind turbines cut off when wind speed is over the cut-out rate; as a result, the power generation of the wind farm decreases. …"
-
179
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
منشور في 2023"…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …"
احصل على النص الكامل
-
180
EVALUATION OF OPTIMIZATION METHODS FOR MACHINING ECONOMICS MODELS
منشور في 2020"…This paper compares the performances and the utilities of six algorithms to identify the most suitable one(s) for solving the machining models. …"
احصل على النص الكامل
article