بدائل البحث:
custom algorithm » control algorithm (توسيع البحث), auction algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element » elements (توسيع البحث)
source » sources (توسيع البحث), resource (توسيع البحث)
custom algorithm » control algorithm (توسيع البحث), auction algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element » elements (توسيع البحث)
source » sources (توسيع البحث), resource (توسيع البحث)
-
1
-
2
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
منشور في 2021"…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…"
-
3
-
4
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
منشور في 2021"…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …"
احصل على النص الكامل
-
5
-
6
-
7
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
منشور في 2024"…</p><h3>Methods</h3><p dir="ltr">BEAMnrc codes simulate radiation sources and model radiation transport for 6 MV and 15 MV photon beams. …"
-
8
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
9
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
10
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
11
-
12
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
13
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
14
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…All created data and source codes are openly available.</p><h2>Other Information</h2><p dir="ltr">Published in: Advances in Engineering Software<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.advengsoft.2022.103392" target="_blank">https://dx.doi.org/10.1016/j.advengsoft.2022.103392</a></p>…"
-
15
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …"
احصل على النص الكامل
-
16
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
Autonomous Demand-Side Management in the Future Smart Grid
منشور في 2016احصل على النص الكامل
doctoralThesis -
18
UML-based regression testing for OO software
منشور في 2010"…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…Findings support the generalizability of the best model, as the platform-specific results from Twitter and Wikipedia are comparable to their respective source papers. We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…"