-
121
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
122
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
123
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
منشور في 1997"…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …"
احصل على النص الكامل
احصل على النص الكامل
article -
124
A genetic-based fuzzy logic power system stabilizer formultimachine power systems
منشور في 1997"…This paper presents a novel approach to combine genetic algorithms (GA) with fuzzy logic systems to design a genetic-based fuzzy logic power system stabilizer (GFLPSS) for multimachine power systems. …"
احصل على النص الكامل
احصل على النص الكامل
article -
125
Hybridizing rule-based power system stabilizers with geneticalgorithms
منشور في 1999"…The proposed approach uses genetic algorithms (GA) to search for optimal settings of rule-based power system stabilizer (RBPSS) parameters. …"
احصل على النص الكامل
احصل على النص الكامل
article -
126
Thermal convection of fluid in fractured media
منشور في 1995"…The computational algorithm is based on the differences between the rates of convective and conductive heat transfers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
127
Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models
منشور في 2022"…Deep learning is the most promising algorithm compared to another Machine Learning (ML) algorithm. …"
احصل على النص الكامل
-
128
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …"
احصل على النص الكامل
-
129
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
منشور في 2024"…Survival analysis results revealed a strong association between <i>RAF1</i> and <i>RAP1A</i> expression levels and diminished survival rates in cancer patients across different cancer types. Integrated machine learning algorithms showed that among the 134 mutations reported for these 2 proteins, only 13 and 35 were classified as deleterious mutations in <i>RAF1</i> and <i>RAP1P</i>, respectively. …"
-
130
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …"
احصل على النص الكامل
-
131
Adaptive PID Controller for a Non Linear Pendulum System Using Recurrent Neural Networks
منشور في 2005احصل على النص الكامل
doctoralThesis -
132
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…The main purpose is to bridge the gap between EDM and International Assessments in the Arab world by applying EDM to predict Grade-4 student levels in TIMSS assessments in the UAE. We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
احصل على النص الكامل
-
133
Discrimination between genuine and acted expressions using EEG signals and machine learning
منشور في 2019احصل على النص الكامل
doctoralThesis -
134
Big Data Energy Management, Analytics and Visualization for Residential Areas
منشور في 2020"…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. To achieve this, two big data processing paradigms are evaluated with a set of qualitative and quantitative metrics with subsequent recommendations. …"
احصل على النص الكامل
article -
135
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…<p dir="ltr">Pathological cancer research relies heavily on different domain-specific applications including nucleus segmentation from histopathology images. …"
-
136
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
منشور في 2022"…This study considers determining the optimal size of a homogeneous fleet of trucks to be outsourced (or subcontracted) from a third-party logistics provider to be used daily to cyclically transport different types of raw materials from designated storage yards to intermediate buffer locations to be fed as inputs to a production facility for processing. …"
-
137
A neuro-heuristic approach for segmenting handwritten Arabic text. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
138
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
منشور في 2015"…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
139
Bootstrap-based Aggregations and their Stability in Feature Selection
منشور في 2022احصل على النص الكامل
doctoralThesis -
140
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis