بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
يعرض 61 - 80 نتائج من 89 نتيجة بحث عن 'differences making algorithm', وقت الاستعلام: 0.05s تنقيح النتائج
  1. 61

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…Results show that, in most cases, our proposed technique out-performs the others in different aspects.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 62
  3. 63

    Practical single node failure recovery using fractional repetition codes in data centers حسب Itani, May

    منشور في 2016
    "…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 64

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives حسب Yassine Himeur (14158821)

    منشور في 2021
    "…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …"
  5. 65
  6. 66
  7. 67

    Random vector functional link network: Recent developments, applications, and future directions حسب A.K. Malik (16003193)

    منشور في 2023
    "…Moreover, we discuss the different hyperparameter optimization techniques followed in the literature to improve the generalization performance of the RVFL model. …"
  8. 68
  9. 69

    Resilience analytics: coverage and robustness in multi-modal transportation networks حسب Abdelkader Baggag (14153040)

    منشور في 2018
    "…<p>A multi-modal transportation system of a city can be modeled as a multiplex network with different layers corresponding to different transportation modes. …"
  10. 70

    DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs حسب Bahareh Jafari (22501715)

    منشور في 2025
    "…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …"
  11. 71
  12. 72

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important issue in cybercrime. …"
  13. 73

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  14. 74

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Steganography is the process of obfuscation that makes something incomprehensible and unclear. Different image steganography research methods are proposed recently but each has their advantages and disadvantages and still have necessity to develop some better image steganography mechanisms to achieve the reliability between the basics criteria of image steganography. …"
  15. 75

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review حسب Avneet Kaur (712349)

    منشور في 2024
    "…The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
  16. 76

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 77

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…However, the ECG can be interpreted differently by humans depending on the interpreter's level of training and experience, which could make diagnosis more difficult. …"
  18. 78

    An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study حسب Ayman Hassan (14426412)

    منشور في 2024
    "…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…"
  19. 79

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 80