بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
181
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
182
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
183
Correlation Clustering with Overlaps
منشور في 2020"…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
184
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
-
185
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …"
احصل على النص الكامل
-
186
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
187
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …"
-
188
-
189
-
190
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
احصل على النص الكامل
-
191
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
192
Nested ensemble selection: An effective hybrid feature selection method
منشور في 2023"…The NES algorithm achieves perfect precision on the synthetic data and near optimal accuracy on the real-life data. …"
احصل على النص الكامل
article -
193
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …"
-
194
-
195
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
منشور في 2022"…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …"
-
196
-
197
-
198
Information warfare. (c2015)
منشور في 2015"…The age of Internet Technology that we are in has introduced new types of attacks to new assets that didn’t exist before. Databases that represent Information assets are subject to attacks that have malicious intentions such as steeling sensitive data, deleting records or violating the integrity of the database. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
199
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
منشور في 2019احصل على النص الكامل
doctoralThesis -
200
Energy Internet: State of the Art and Challenges
منشور في 2024"…While previous studies have individually examined the Energy Internet, energy-efficient communications, and green data centers, a critical need exists to systematically categorize and survey research at the intersection of these fields. …"