بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
develop a » developing a (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
develop a » developing a (توسيع البحث)
element » elements (توسيع البحث)
-
201
-
202
Cuckoo search for portfolio optimization. (c2014)
منشور في 2014احصل على النص الكامل
احصل على النص الكامل
masterThesis -
203
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
204
Scalable Nonparametric Supervised Learning for Streaming and Massive Data: Applications in Healthcare Monitoring and Credit Risk
منشور في 2025"…Additionally, an online classifier is developed for streaming data, combining online PCA with a kernel-based recursive classifier using a stochastic approximation algorithm. …"
-
205
حوكمة الذكاء الاصطناعي ضمن أحكام القانون الدولي لحقوق الإنسان
منشور في 2022احصل على النص الكامل
article -
206
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
احصل على النص الكامل
احصل على النص الكامل
article -
207
Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr...
منشور في 2020"…This study aims to develop a novel low-cost remote sensing approach for spatiotemporal mapping and monitoring mangrove forest extent in the northern part of the United Arab Emirates. …"
احصل على النص الكامل
article -
208
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
منشور في 2023"…Therefore, an enhanced particle swarm optimization (PSO), data reduction, and interval-valued representation are proposed. First, a feature selection tool using PSO Algorithm is developed. …"
-
209
Public Administration Studies: The Digital Trajectory
منشور في 2022"…After looking at current ICT phenomena — from AI to gaming — and how PA has taken them up, two critical, interlinked phenomena are then analyzed: MOOCs (Massive Open Online Courses) and their effects, including a review of how the Covid-19 pandemic pushed this kind of teaching, and the current ability of algorithms to write a certain type of texts. …"
-
210
A stochastic PID controller for a class of MIMO systems
منشور في 2017"…The development of the proposed algorithm is based on minimising a stochastic performance index. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
211
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
212
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
منشور في 2022"…Next, as a feature selection tool, an improved extension of Artificial Butterfly Optimization (ABO) algorithm is used in order to extract the significant features from data and improve the diagnosis results of multiscale interval SVM. …"
-
213
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
214
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…<p dir="ltr">In this paper, a Lorenz-like chaotic system was developed to encrypt the dorsal hand patterns on a microcomputer. …"
-
215
A combinatorial auction‐based approach for ridesharing in a student transportation system
منشور في 2023"…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …"
-
216
Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice
منشور في 2020"…Our approach is a simple and efficient voice-based algorithm in which a multi-center and multi threshold based ternary pattern is used (MCMTTP). …"
-
217
-
218
-
219
A hybrid approach for XML similarity
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
220
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis