بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
-
2
-
3
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
4
The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns
منشور في 2024"…AI technologies offer significant advantages, such as data-driven insights, improved efficiency, and enhanced predictive capabilities, which can support educational leaders in making more informed decisions. However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …"
احصل على النص الكامل
-
5
-
6
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016احصل على النص الكامل
doctoralThesis -
7
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
8
A matrix-based damage assessment and recovery algorithm
منشور في 2014"…With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
A hybrid genetic algorithm for task allocation in multicomputers
منشور في 2018"…A hybrid genetic algorithm for the task allocation problem (HGATA) in multicomputers is presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
منشور في 2024"…This study presents long-term solar resource monthly maps for Qatar. …"
-
11
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
12
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
منشور في 2015"…Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
13
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…Hence, there is a great need for a new automated approach in order to make diagnosis more reliable. In this paper, we present a twophase technique to classify images of lesions into benign or malignant. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
14
Improved search-tree algorithms for the cluster edit problem. (c2011)
منشور في 2011احصل على النص الكامل
احصل على النص الكامل
masterThesis -
15
-
16
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. We present the new framework for the detection of cyberattacks, which makes use of AI and ML. …"
احصل على النص الكامل
احصل على النص الكامل
-
17
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …"
احصل على النص الكامل
article -
18
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Transient analysis and control algorithm are presented and validated during both starting and load transient conditions by means of simulation results. …"
-
19
A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading
منشور في 2020"…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…"
-
20
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis