بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
-
781
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …"
-
782
A Novel Centrality-Based Approach for Link Prediction
منشور في 2025"…Namely, we consider weighted betweenness, closeness and Katz centralities, in addition to the Resource Allocation and Adamic-Adar indices. We also use a genetic algorithm to optimize the weights of these metrics, reflecting their contributions to link prediction. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
783
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
منشور في 2022"…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …"
-
784
-
785
An automated temporal partitioning tool for a class of DSP applications
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
786
Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls
منشور في 2025"…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …"
احصل على النص الكامل
-
787
Control of cardiac alternans by mechanical and electrical feedback
منشور في 2014"…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …"
احصل على النص الكامل
article -
788
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
منشور في 2023"…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …"
احصل على النص الكامل
-
789
-
790
Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose
منشور في 2020"…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …"
-
791
Improving the security of SNMP in wireless networks
منشور في 2017"…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
792
Robustness evaluation of real-Time Protocols
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
793
Computational evluation of protein energy functions
منشور في 2014"…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
794
-
795
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
796
-
797
A machine learning approach for localization in cellular environments
منشور في 2018"…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
798
-
799
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …"
احصل على النص الكامل
article -
800