بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
41
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
منشور في 2015احصل على النص الكامل
doctoralThesis -
42
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
منشور في 2021"…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. …"
-
43
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …"
-
44
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
منشور في 2024"…However, the existing insights are scattered over different sub-topics and most of the existing review papers have ignored the underground decision-making process using OR methods. This paper aims to depict the current state of the art of the articles on SC optimization in I4.0 and identify the frontiers and limitations as well as the promising research avenue in this arena. …"
-
45
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
منشور في 2014احصل على النص الكامل
doctoralThesis -
46
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
منشور في 2007"…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
47
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
-
48
A novel few shot learning derived architecture for long-term HbA1c prediction
منشور في 2024"…Despite the impact of such prediction capabilities, no work in the literature or industry has investigated the futuristic prediction of HbA1c using current blood glucose (BG) measurements. For the first time in the literature, this work proposes a novel FSL-derived algorithm for the long-term prediction of clinical HbA1c measures. …"
-
49
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
50
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…A detailed analysis of the ML pipelines is provided, and the in-demand methods and algorithms are summarized in augmentative tables and figures. …"
احصل على النص الكامل
article -
51
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
52
Modelling Exchange Rates during Currency Crisis using Neural Networks
منشور في 2006"…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
53
What are artificial intelligence literacy and competency? A comprehensive framework to support them
منشور في 2024"…The major frameworks are focused on identifying content and technical knowledge (AI literacy). Most of the current definitions of AI literacy for a non-technical audience are developed from an engineering perspective and may not be appropriate for K–12 education. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
54
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
منشور في 2023"…Artificial Intelligence (AI) has the potential to provid new ways analyzing the patient data and making predictions about treatment outcomes or toxicity. …"
-
55
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
منشور في 2021"…<p>The current electric power system witnesses a significant transition into Smart Grids (SG) as a promising landscape for high grid reliability and efficient energy management. …"
-
56
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
-
57
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …"
-
58
Fine-grain watermarking for intellectual property protection
منشور في 2019"…Making copies of these text contents is simple and virtually costless. …"
-
59
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…The main concerns affecting the current occupancy detection system in terms of privacy and precision were thoroughly discussed. …"
-
60
CEAP
منشور في 2016"…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article