بدائل البحث:
injection algorithm » detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
injection algorithm » detection algorithm (توسيع البحث), auction algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
-
161
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
منشور في 2021"…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
-
162
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
163
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
164
A Deployment Optimization Model for Wimax Base-Stations
منشور في 2011احصل على النص الكامل
doctoralThesis -
165
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
منشور في 2023"…The detailed modeling of the whole system is presented, including measured wind speed data, detailed switching techniques, a drive train model of the turbine, and real SMESD. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
166
Using machine learning for disease detection. (c2013)
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
masterThesis -
167
A forward-backward Kalman for the estimation of time-variant channels in OFDM
منشور في 2005"…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
احصل على النص الكامل
احصل على النص الكامل
article -
168
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
منشور في 2023"…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. …"
-
169
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
منشور في 0000"…In this paper, we propose an expectation-maximization algorithm for joint channel and data recovery in fast fading environments. …"
احصل على النص الكامل
احصل على النص الكامل
article -
170
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
171
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
172
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
173
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
منشور في 2024"…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
احصل على النص الكامل
-
174
Public schools regrouping decision support system. (c1997)
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
masterThesis -
175
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
منشور في 2023"…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
176
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…<p dir="ltr">Pathological cancer research relies heavily on different domain-specific applications including nucleus segmentation from histopathology images. …"
-
177
Active distribution network type identification method of high proportion new energy power system based on source-load matching
منشور في 2023"…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
178
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
احصل على النص الكامل
-
179
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
180