بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
models using » model using (توسيع البحث)
elements rd » elements _ (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
models using » model using (توسيع البحث)
elements rd » elements _ (توسيع البحث)
-
861
HVAC system attack detection dataset
منشور في 2021"…Given the limitations on accessing a real HVAC system for research purposes and the unavailability of public labeled datasets to investigate the cybersecurity of HVAC systems, this paper presents a dataset of a 12-zone HVAC system that was collected from a simulation model using the Transient System Simulation Tool (TRNSYS). …"
-
862
Machine Learning Techniques for Pharmaceutical Bioinformatics
منشور في 2018"…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …"
احصل على النص الكامل
-
863
Optimal Planning of Distributed Generators and Shunt Capacitors in Isolated Microgrids With Nonlinear Loads
منشور في 2020"…The intermittent natures of loads and renewable DGs are modelled probabilistically. The effectiveness of the proposed planning approach has been validated using the PG&E 69-bus system, and the followings are observed: 1) the significance of applying suitable fundamental-power-flow and harmonic-power-flow algorithms for isolated microgrids, and 2) the possibility of avoiding a severe voltage distortion by utilizing an appropriate planning method and only small increase in the cost.…"
احصل على النص الكامل
article -
864
Transformations for Variants of the Travelling Salesman Problem and Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
865
Artificial Intelligence for Assessing the Correlation Between Sleep Apnoea and Comorbidities
منشور في 2022احصل على النص الكامل
doctoralThesis -
866
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
منشور في 2023"…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …"
-
867
Virtualizing and Scheduling FPGA Resources in Cloud Computing Datacenters
منشور في 2021احصل على النص الكامل
doctoralThesis -
868
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
منشور في 2020"…The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
احصل على النص الكامل
article -
869
A fine-grained XML structural comparison approach
منشور في 2007"…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
870
-
871
Data Endowment as a Digital Waqf: An Islamic Ethical Framework for AI Development
منشور في 2025"…<p dir="ltr">In the era of artificial intelligence (AI), data is often called the new oil—an essential asset for training algorithms and fueling intelligent systems. However, the ethical considerations surrounding this data’s ownership, use, and benefits remain contentious. …"
-
872
-
873
-
874
Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces
منشور في 2021"…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …"
-
875
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
منشور في 2022"…Additionally, we evaluate the performance of the best developed model with children. Machine learning algorithms experiments showed that XGBoost achieved the best performance across all metrics (e.g., accuracy of 90%) and provided fast predictions (i.e., 0.004 s) for the test samples. …"
-
876
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
منشور في 2017"…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. The accurate model comparison on the standard CoNLL-2012 setting shows the benefit of more expressive loss functions.…"
-
877
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
878
Approximate XML structure validation technical report
منشور في 2014"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
879
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
منشور في 2023"…Secondly, to illustrate the gravity of these issues, we present a case study on the task of human facial emotion recognition (FER) based on AffectNet dataset, where we analyze the effects of widely used input quantization on the security, robustness, fairness, and trustworthiness of an EML model. …"
-
880