بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
elements per » elementi per (توسيع البحث), elements _ (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
elements per » elementi per (توسيع البحث), elements _ (توسيع البحث)
-
321
Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier
منشور في 2021"…Specifically, short local histograms are drawn to represent individual appliance consumption signatures and robustly extract appliance-level data from the aggregated power signal. Furthermore, an improved k-nearest neighbors (IKNN) algorithm is presented to reduce the learning computation time and improve the classification performance. …"
-
322
Generic metadata representation framework for social-based event detection, description, and linkage
منشور في 2020"…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
323
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
منشور في 2019"…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …"
-
324
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
منشور في 2024"…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
احصل على النص الكامل
-
325
-
326
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
منشور في 2023"…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …"
-
327
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
328
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
منشور في 2024"…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …"
احصل على النص الكامل
-
329
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
330
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
331
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
منشور في 2018"…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …"
احصل على النص الكامل
-
332
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
333
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
منشور في 2020"…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
-
334
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
335
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
منشور في 2022"…Additionally, we evaluate the performance of the best developed model with children. Machine learning algorithms experiments showed that XGBoost achieved the best performance across all metrics (e.g., accuracy of 90%) and provided fast predictions (i.e., 0.004 s) for the test samples. …"
-
336
CEAP
منشور في 2016"…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
337
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
منشور في 2025"…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …"
احصل على النص الكامل
-
338
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
339
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …"
-
340
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"