بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
search » research (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
search » research (توسيع البحث)
-
581
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
582
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
منشور في 2007"…Three years of data are used for model building and validation. …"
احصل على النص الكامل
article -
583
FoGMatch
منشور في 2019"…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
584
Severity-Based Prioritized Processing of Packets with Application in VANETs
منشور في 2019"…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
-
585
Information Warfare
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
586
Scatter search for homology modeling
منشور في 2016"…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
587
Video features with impact on user quality of experience
منشور في 2021"…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
588
Innovative mobile E-healthcare systems
منشور في 2016"…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
589
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…"
-
590
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
591
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…"
-
592
-
593
Regression Testing of Database Applications
منشور في 2002"…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
594
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
منشور في 2024"…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
احصل على النص الكامل
-
595
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
596
Query acceleration in distributed database systems
منشور في 2001"…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
597
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
-
598
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
منشور في 2023"…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
599
Cross entropy error function in neural networks
منشور في 2002"…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
600
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article