بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
-
101
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
منشور في 2023"…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"
-
102
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
منشور في 2024"…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. …"
-
103
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
احصل على النص الكامل
-
104
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
منشور في 2022"…Next, as a feature selection tool, an improved extension of Artificial Butterfly Optimization (ABO) algorithm is used in order to extract the significant features from data and improve the diagnosis results of multiscale interval SVM. …"
-
105
Performance Modeling of Rooftop PV Systems in Arid Climate, a Case Study for Qatar: Impact of Soiling Losses and Albedo Using PVsyst and SAM
منشور في 2025"…<p dir="ltr">This study presents a comparative performance modeling and optimization framework for a 5 kWp rooftop photovoltaic (PV) system in Qatar, using two widely adopted simulation tools, PVsyst and the System Advisor Model (SAM). …"
-
106
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. …"
-
107
-
108
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…The models presented prove that data analytics can create new value in an ETC environment. The methods and tools used for modeling the prediction model can be generalized to be used in the rest of the ETC system also. …"
احصل على النص الكامل
-
109
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
منشور في 2017"…The SPARCS system accepts design specifications at the behavior level, in the form of task graphs. The system contains a temporal partitioning tool to temporally divide and schedule the tasks on the reconfigurable architecture, a spatial partitioning tool to map the tasks to individual FPGAs, and a high-level synthesis tool to synthesize efficient register-transfer level designs for each set of tasks destined to be downloaded on each FPGA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
110
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
111
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
112
-
113
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
احصل على النص الكامل
-
114
-
115
Turbo-charging dominating set with an FPT subroutine
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
116
Design and implementation of a deep learning-empowered m-Health application
منشور في 2023"…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …"
-
117
The Effects of Data Mining on Small Businesses in Dubai
منشور في 2011"…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
احصل على النص الكامل
-
118
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
119
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
120
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"