بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tool using » tools using (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tool using » tools using (توسيع البحث)
-
301
Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches
منشور في 2018"…It was also important to note that higher soiling did not correlate to higher cleaning requirements, as the cleaning was dependent not only on the soiling but on the PV output and cleaning costs. The algorithm was found to be an effective yet simple tool to help PV owners decide on cleaning procedures, however it does not take into account the effect of natural cleaning events. …"
احصل على النص الكامل
-
302
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
303
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
304
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
-
305
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
احصل على النص الكامل
-
306
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
307
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
308
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …"
-
309
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
-
310
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…The models presented prove that data analytics can create new value in an ETC environment. The methods and tools used for modeling the prediction model can be generalized to be used in the rest of the ETC system also. …"
احصل على النص الكامل
-
311
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
312
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
313
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
314
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
منشور في 2015احصل على النص الكامل
doctoralThesis -
315
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…However, the largest experiments conducted to date, have had only hundreds of participants. In this work, we processed the data of the recently published Multi-Ethnic Study of Atherosclerosis (MESA) Sleep study to have both PSG and actigraphy data synchronized. …"
-
316
Improving Rule Set Based Software Quality Prediction
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
article -
317
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
منشور في 2024"…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …"
احصل على النص الكامل
-
318
-
319
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
منشور في 2017"…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
احصل على النص الكامل
article -
320
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
منشور في 2018"…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article