بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
181
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …"
-
182
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
منشور في 2024احصل على النص الكامل
doctoralThesis -
183
Benchmarking Concept Drift Detectors for Online Machine Learning
منشور في 2022"…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
184
Optimizing ADWIN for Steady Streams
منشور في 2022"…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
185
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
186
Compensation of axle-generator errors due to wheel slip and slide
منشور في 2002"…Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
187
Information warfare. (c2015)
منشور في 2015"…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
188
A 3-D vision-based man-machine interface for hand-controlled telerobot
منشور في 2005"…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …"
احصل على النص الكامل
احصل على النص الكامل
article -
189
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
190
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
منشور في 2022"…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
-
191
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
-
192
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
منشور في 2024"…Hamad International Training Center not only offers formal resuscitation training like Advanced Life Support Obstetrics and Neonatal Resuscitation Program courses but also ensures the frontline care providers’ readiness for managing cardiac arrest events in Hamad Medical Corporation facilities through regular mock drills and monitoring the relevant Key Performance Indicators (KPIs). The study aimed to explore the impact of a multidisciplinary maternal resuscitation training program and the introduction of the maternal resuscitation algorithm pathway (Figure 1) on the relevant seven KPIs.…"
-
193
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
194
-
195
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
196
CEAP
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
197
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…Data extracted from the included studies were synthesized narratively.…"
-
198
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
منشور في 2021"…Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …"
-
199
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
احصل على النص الكامل
article -
200
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis