بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
-
361
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The ENST00000671612.1 lncRNA transcript correlated with worse refractory free survival (RFS). Our data provides a step towards finding a novel diagnostic lncRNA-based panel for TNBC with potential therapeutic implications.…"
-
362
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
363
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
364
Soft Sensor for NOx Emission using Dynamical Neural Network
منشور في 2020"…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …"
احصل على النص الكامل
article -
365
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
366
Innovative mobile E-healthcare systems
منشور في 2016"…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
367
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …"
-
368
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
369
-
370
A fine-grained XML structural comparison approach
منشور في 2007"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
371
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
372
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
373
Scatter search technique for exam timetabling
منشور في 2011"…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
374
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
منشور في 2018"…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
375
MoveSchedule
منشور في 1995"…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
376
A new approach and faster exact methods for the maximum common subgraph problem
منشور في 2017"…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
377
Scatter search for homology modeling
منشور في 2016"…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
378
Tracking and repairing damaged healthcare databases using the matrix
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
379
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
منشور في 2009"…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
380
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article