بدائل البحث:
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
iii algorithm » rd algorithm (توسيع البحث)
based iii » basel iii (توسيع البحث), based iot (توسيع البحث)
element » elements (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
iii algorithm » rd algorithm (توسيع البحث)
based iii » basel iii (توسيع البحث), based iot (توسيع البحث)
element » elements (توسيع البحث)
-
1
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019الموضوعات: احصل على النص الكامل
article -
2
-
3
-
4
Development of an Optimization Algorithm for Internet Data Traffic
منشور في 2020"…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …"
احصل على النص الكامل
article -
5
-
6
Three-phase simulated annealing algorithms for exam scheduling
منشور في 2003"…Hence, we refer to our solution methods as 3-phase simulated annealing (3PSA). We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
7
-
8
-
9
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…"
احصل على النص الكامل
احصل على النص الكامل
article -
11
-
12
-
13
Belief selection in point-based planning algorithms for POMDPs
منشور في 2017"…We study three methods designed to improve point-based value iteration algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
15
A three-stage hybrid heuristic algorithm for the capacitated vehicle routing problem. (c2016)
منشور في 2016"…We consider heuristic methods that are based on two-phase algorithms. Each such algorithm starts by clustering the underlining network before proceeding into the route construction phase. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
16
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
منشور في 2024"…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …"
-
17
RRT and Octomap based 3D environment exploration and mapping
منشور في 2020احصل على النص الكامل
doctoralThesis -
18
FarmTech: Regulating the use of digital technologies in the agricultural sector
منشور في 2023"…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …"
-
19
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
منشور في 2005"…The 3G cellular mobile systems which are based on WCDMA technology are expected to be interference limited. …"
احصل على النص الكامل
احصل على النص الكامل
article -
20
A comparative study of ElGamal based digital signature algorithms
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject