بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
161
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
162
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
منشور في 2023"…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …"
-
163
A heuristics for HTTP traffic identification in measuring user dissimilarity
منشور في 2020"…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …"
-
164
-
165
A combinatorial auction‐based approach for ridesharing in a student transportation system
منشور في 2023"…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …"
-
166
Analysis of power system stability enhancement via excitation and FACTS-based stabilizers
منشور في 2004"…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …"
احصل على النص الكامل
article -
167
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
منشور في 2019"…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …"
-
168
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
منشور في 2020"…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …"
-
169
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
منشور في 2025احصل على النص الكامل
doctoralThesis -
170
AI-based remaining useful life prediction and modelling of seawater desalination membranes
منشور في 2024احصل على النص الكامل
doctoralThesis -
171
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
منشور في 2021"…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …"
-
172
Minimizing using BBO and DFO methods
منشور في 2022"…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
173
Identification of physically based models of residential air-conditioners for direct load control management
منشور في 2004"…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
174
-
175
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. In SASA, the incident wave that is the first coming wave-packet is taken as a mother wavelet. …"
احصل على النص الكامل
-
176
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …"
-
177
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
منشور في 2024"…This work centers on developing an intelligent hybrid system combining communication lines using millimeter wave (mmWave) and Visible light communication (VLC). …"
-
178
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
منشور في 2023"…PubMed, Google Scholar, Science Direct, BioRXiv, and MedRxiv were explored to identify relevant articles. Study selection and data extraction were independently conducted by 2 reviewers. …"
-
179
Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance
منشور في 2025"…In the first stage, a robust Sliding Mode Control (SMC)-based nonlinear decoupled control algorithm is designed to efficiently regulate BDFIG operation. …"
-
180