بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
541
Crown Structures for Vertex Cover Kernelization
منشور في 2007"…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. Two vertex cover kernelization methods are discussed. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
542
Identification of phantom movements with an ensemble learning approach
منشور في 2022"…The ensemble learning-based approaches outperformed the SVM, Decision tree, and kNN methods. …"
-
543
Comparative Study on Arabic Text Classification: Challenges and Opportunities
منشور في 2022"…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…"
احصل على النص الكامل
-
544
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
545
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
منشور في 2024"…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. …"
-
546
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
احصل على النص الكامل
-
547
Radar Pulse Interleaving For Multi-Target Tracking
منشور في 2020"…In this paper, we present new tight 0-1 integer programming models for the radar pulse interleaving problem and develop effective solution methods based on Lagrangian relaxation techniques.…"
احصل على النص الكامل
article -
548
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
549
Unsupervised outlier detection in multidimensional data
منشور في 2022"…The proposed techniques are based on statistical methods considering data compactness and other properties. …"
-
550
FarmTech: Regulating the use of digital technologies in the agricultural sector
منشور في 2023"…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …"
-
551
Analysis of control strategies for smoothing of solar PV fluctuations with storage devices
منشور في 2023"…The paper aims to analyze the ramp-rate and step-rate control methods for smoothing solar PV fluctuations based on the irradiation profiles in a DC microgrid (MG) environment. …"
-
552
Arabic text recognition
منشور في 2004"…Thus, the need to attempt a research related to Arabic handwritten text recognition. Algorithms based on neural networks have proved to give better results than conventional methods when applied to problems where the decision rules of the classification problem are not clearly defined. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
553
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
احصل على النص الكامل
احصل على النص الكامل
-
554
Enhancing e-learning through AI: advanced techniques for optimizing student performance
منشور في 2024"…This study offers a thorough examination of how AI can be utilized to enhance e-learning results by employing advanced predictive methods and performance optimization strategies. The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …"
-
555
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
منشور في 2024"…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…"
-
556
Cardiovascular health research priorities in the United Arab Emirates
منشور في 2023"…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …"
احصل على النص الكامل
article -
557
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
558
The role of Reinforcement Learning in software testing
منشور في 2023"…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
-
559
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
منشور في 2025"…A comparative evaluation of three FL algorithms (FedAvg, FedProx, Mime-lite) identifies the most suitable aggregation strategy. …"
-
560
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
منشور في 2021"…Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …"