بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
-
461
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
462
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
-
463
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
منشور في 2014احصل على النص الكامل
doctoralThesis -
464
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. …"
-
465
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
منشور في 2020"…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…"
احصل على النص الكامل
article -
466
Optimizing ADWIN for Steady Streams
منشور في 2022"…Learning from data streams, aka online machine learn ing, is no exception. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
467
-
468
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
-
469
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
منشور في 2018"…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
احصل على النص الكامل
-
470
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Multiple models have been proposed and different techniques and data structures were used. Our approach provides a damage assessment and recovery algorithm that is based on agents and graphs.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
471
Modelling Exchange Rates during Currency Crisis using Neural Networks
منشور في 2006"…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
472
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
منشور في 2022"…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. The cumulative case data of the clustered countries enriched with data related to the lockdown measures are fed to the bidirectional LSTM to train the forecasting model. …"
-
473
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
منشور في 2015احصل على النص الكامل
doctoralThesis -
474
-
475
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
476
-
477
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
منشور في 2007"…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
478
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis -
479
-
480
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
منشور في 2023"…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"