Search alternatives:
application algorithm » pollination algorithm (Expand Search), auction algorithm (Expand Search)
application algorithm » pollination algorithm (Expand Search), auction algorithm (Expand Search)
-
741
Arabic Hotel Reviews Sentiment Analysis Using Deep Learning
Published 2023“…Overall, this study highlights the importance of sentiment analysis in the context of Arabic Hotel Feedback and provides a foundation for future research and applications in the field. The insights gained from sentiment analysis can empower hotel owners, marketers, and decision-makers to better understand customer sentiments, address concerns, and optimize their services to meet customer expectations in the dynamic and competitive hotel industry.…”
Get full text
-
742
On the complexity of bilinear computations
Published 1984“…We will also consider special classes of three bilinear forms, and efficient algorithms will be developed, which are optimal in most cases.…”
Get full text
Get full text
Get full text
masterThesis -
743
Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration
Published 2025“…<p dir="ltr">Subsurface sequestration of carbon dioxide (CO<sub>2</sub>) is driving efforts to attain carbon neutrality. For the safe and optimal operation of such complex applications, it is imperative to understand the physics of fluids displacement. …”
-
744
Predicting the Release of Chemotherapeutics From the Core of Polymeric Micelles Using Ultrasound
Published 2015“…The proposed algorithms are first tested using a simulation environment. …”
Get full text
article -
745
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…”
Get full text
Get full text
Get full text
Get full text
article -
746
Virtualizing and Scheduling FPGA Resources in Cloud Computing Datacenters
Published 2021Get full text
doctoralThesis -
747
Experimental evaluation of multi-agent reinforcement learning in real-world scale-free networks
Published 2010“…Multi-agent reinforcement learning is a common method for optimizing agents' local decision in a distributed and scalable manner. …”
Get full text
-
748
Towards Multimedia Fragmentation
Published 2006“…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
749
ISSP
Published 2017“…The underlying algorithms optimize positions of resources by minimizing handling and rehandling costs of these on site. …”
Get full text
Get full text
Get full text
conferenceObject -
750
Hybridizing rule-based power system stabilizers with geneticalgorithms
Published 1999“…The proposed approach uses genetic algorithms (GA) to search for optimal settings of rule-based power system stabilizer (RBPSS) parameters. …”
Get full text
Get full text
article -
751
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
752
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
Get full text
-
753
Predicting Android Malware Using Evolution Networks
Published 2025“…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …”
Get full text
Get full text
Get full text
masterThesis -
754
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…In this article, an effort is made to enhance the performance of the IMMSE filter in terms of speckle reduction and spatial detail preservation by refining the choice of the initial filter, optimizing its parameters, and improving the estimation of local statistics. …”
Get full text
article -
755
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…Irrespective of the adopted processes for corrosion monitoring, it was concluded that none of these methods represent an optimum solution by itself, where employing a combination of multiple systems is one way of optimizing its results. New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
Get full text
-
756
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…AI algorithms depend on data for training and analysis. …”
Get full text
-
757
Artificial intelligence models for predicting the mode of delivery in maternal care
Published 2025“…<h3>Background</h3><p dir="ltr">Accurate prediction of the mode of delivery is critical in maternal care to improve prenatal counseling, optimize clinical decision-making, and reduce maternal and neonatal complications. …”
-
758
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. Moreover, the optimal percentage of packets considered within a flow while extracting flow-level features is determined. …”
Get full text
article -
759
Defined Clinical Classifications Are Associated with Outcome of Patients with Anatomically Resectable Pancreatic Adenocarcinoma Treated with Neoadjuvant Therapy
Published 2012“…It may be used with neoadjuvant therapy to predict outcomes, individualize treatment algorithms, and optimize survival.…”
Get full text
Get full text
Get full text
article -
760
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…To address this, the authors propose a hybrid threat intelligence framework that is not only highly scalable but also incorporates self-optimizing capabilities, enabling it to counteract a wide range of persistent cyber threats and attacks targeting IIoT systems. …”