بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
-
1
Application of Heuristic Algorithms for Multiuser Detection
منشور في 0000"…In this paper we propose application of heuristic algorithms in multiuser detection (MUD). The proposed algorithm combines a tabu search heuristic algorithm with a local search heuristic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
2
Detection of statistically significant network changes in complex biological networks
منشور في 2017"…<h3>Background</h3><p dir="ltr">Biological networks contribute effectively to unveil the complex structure of molecular interactions and to discover driver genes especially in cancer context. …"
-
3
A novel linear time corner detection algorithm
منشور في 2005"…The complexity of our algorithm is linear. It is very efficient and as well as accurate. …"
احصل على النص الكامل
احصل على النص الكامل
article -
4
-
5
-
6
-
7
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
منشور في 2024"…The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …"
احصل على النص الكامل
-
8
YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm
منشور في 2025"…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …"
-
9
-
10
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
منشور في 2022"…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …"
-
11
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
احصل على النص الكامل
-
12
-
13
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
منشور في 2022"…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…"
-
14
Fault detection and classification in hybrid energy-based multi-area grid-connected microgrid clusters using discrete wavelet transform with deep neural networks
منشور في 2024"…Nowadays, deep learning algorithms are essential for ensuring the reliable, safe, and efficient operation of these complex energy systems. …"
-
15
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
16
Unsupervised outlier detection in multidimensional data
منشور في 2022"…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …"
-
17
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
18
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies. …"
احصل على النص الكامل
-
19
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
20
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies.…"
احصل على النص الكامل