بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
-
461
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
منشور في 2015"…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
462
Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation
منشور في 2024"…The model produces category-based feature vector representations that are used to augment the document representations and perform the classification task. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
463
Thermal convection of fluid in fractured media
منشور في 1995"…The computational algorithm is based on the differences between the rates of convective and conductive heat transfers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
464
-
465
Control of cardiac alternans by mechanical and electrical feedback
منشور في 2014"…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …"
احصل على النص الكامل
article -
466
CEAP
منشور في 2016"…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
467
Intelligent Hybrid Feature Selection for Textual Sentiment Classification
منشور في 2021"…The selected sentiment features are further refined by applying a wrapper-based backward feature selection method. Finally, for textual sentiment classification, the well-known classification algorithms Support Vector Machine (SVM), Naive Bayes (NB), Generalized Linear Model (GLM) are trained in the ensemble model on the refined sentiment feature set. …"
-
468
Electric Vehicles Charging Station Load Forecasting Integration With Renewable Energy Using Novel Deep EfficientBiLSTMNet
منشور في 2025"…The model’s hyperparameters are optimized using an Enhanced Firefly Algorithm (EFA). …"
-
469
Pre-production movie rating prediction using machine learning. (c2017)
منشور في 2017"…Results show that machine learning is useful in this domain and genetic algorithms can be used to build prediction models with relatively good performance. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
470
Random vector functional link network: Recent developments, applications, and future directions
منشور في 2023"…Moreover, we discuss the different hyperparameter optimization techniques followed in the literature to improve the generalization performance of the RVFL model. Finally, we present potential future research directions/opportunities that can inspire the researchers to improve the RVFL’s architecture and learning algorithm further. …"
-
471
Improving the security of SNMP in wireless networks
منشور في 2017"…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
472
Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier
منشور في 2023"…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …"
احصل على النص الكامل
احصل على النص الكامل
-
473
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
-
474
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…Most of the studies used data sets with a size of <10,000 samples (32/47, 68%). Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). …"
-
475
Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog...
منشور في 2023"…The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
476
Robustness testing of composed real-time systems
منشور في 2010"…In this paper, we suggest a methodology for testing robustness of Real-Time Component-Based Systems (RTCBS). A RTCBS system is described as a collection of components where each component is modeled as a Timed Input-Output Automaton (TIOA). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
477
A machine learning approach for localization in cellular environments
منشور في 2018"…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
478
-
479
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…Up to now, most of the numerical works dealing with the modeling of the isothermal EHL problem were based on a weak coupling resolution of the Reynolds and elasticity equations (semi-system approach). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
480
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
منشور في 2021"…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …"
احصل على النص الكامل