بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
based methods » based method (توسيع البحث), mixed methods (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
based methods » based method (توسيع البحث), mixed methods (توسيع البحث)
-
541
Fuzzy Controllers Design Using Space-Filling Curves
منشور في 2020"…The paper introduces first the Hilber Space-filling curves, and outlines algorithms for clustering and adaptive clustering which demonstrate the SFC efficient self-organizing features. …"
احصل على النص الكامل
article -
542
Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications
منشور في 2025"…</p><h3>Materials and methods</h3><p dir="ltr">An ensemble<u> species distribution modelling </u>approach, integrating regression-based and machine-learning algorithms (GLM, GBM, RF, MaxEnt), was used to project habitat suitability (Current time and by 2050, 2070, and 2090). …"
-
543
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
منشور في 2024"…Our study demonstrates the effectiveness of the FBFT method, achieving impressive accuracies across multiple brain disorders using CNN-based classification. …"
-
544
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
545
-
546
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
منشور في 2024"…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …"
-
547
MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network
منشور في 2022"…Leave-one-out cross-validation method was used in this work. The performance of the deep learning models is measured using three well-known performance matrices viz. mean absolute error (MAE)-based construction error, the difference in the signal-to-noise ratio (ΔSNR), and percentage reduction in motion artifacts (<i>η</i>). …"
-
548
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
منشور في 2024"…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …"
-
549
Fine-grain watermarking for intellectual property protection
منشور في 2019"…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …"
-
550
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
منشور في 2023"…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …"
-
551
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
منشور في 2025"…We combine features from all three modes of MMF-NIOM to achieve a state-of-the-art non-intrusive occupancy classification performance of 91.5 % accuracy and 91.5 % f1-score, approximately, by an ensemble of fine-tuned classifiers on the electricity consumption & occupancy (ECO) dataset. The proposed method is sustainable, robust, adaptable to various households, and can be mass-implemented within smart meters at a much lower cost and effort compared to the traditional internet of things (IoT)-based intrusive systems.…"
-
552
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
553
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…We thus propose Con-Detect—a Contribution based Detection method—for detecting adversarial attacks against NLP classifiers. …"
-
554
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
منشور في 2018"…Compressive sensing (CS) has been explored as a method to extend the battery lifetime of medical wearable devices. …"
-
555
Localizing-ground Transmitters Using Airborne Antenna Array
منشور في 2020احصل على النص الكامل
doctoralThesis -
556
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
منشور في 2022"…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …"