بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
all algorithm » carlo algorithm (توسيع البحث), jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث)
based all » based alloys (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
all algorithm » carlo algorithm (توسيع البحث), jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث)
based all » based alloys (توسيع البحث)
element » elements (توسيع البحث)
-
1
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019الموضوعات: احصل على النص الكامل
article -
2
-
3
-
4
Development of an Optimization Algorithm for Internet Data Traffic
منشور في 2020"…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …"
احصل على النص الكامل
article -
5
Intelligent Rapidly-Exploring Random Tree Star Algorithm
منشور في 2024احصل على النص الكامل
doctoralThesis -
6
-
7
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
-
9
-
10
-
11
A matrix-based damage assessment and recovery algorithm
منشور في 2014"…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …"
احصل على النص الكامل
article -
13
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
منشور في 2024"…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …"
-
14
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
15
-
16
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
17
-
18
-
19
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
20
Enhancement of blocking performance in all-optical WDM networks. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis