بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
fbe algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
fbe algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
241
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. …"
-
242
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
منشور في 2018احصل على النص الكامل
doctoralThesis -
243
-
244
Meta-Heuristic Procedures for the Multi-Resource Leveling Problem with Activity Splitting
منشور في 2011احصل على النص الكامل
doctoralThesis -
245
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
منشور في 2022"…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. …"
احصل على النص الكامل
-
246
-
247
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
منشور في 2021"…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …"
احصل على النص الكامل
احصل على النص الكامل
-
248
-
249
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
منشور في 2020"…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
احصل على النص الكامل
-
250
An easy-to-use scalable framework for parallel recursive backtracking
منشور في 2013"…Solving NP-hard graph problems to optimality using exact algorithms is an example of an area in which there has so far been limited success in obtaining large scale parallelism. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
251
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …"
-
252
Energy-aware adaptive compression for mobile devices. (c2009)
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
masterThesis -
253
Using machine learning for disease detection. (c2013)
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
masterThesis -
254
-
255
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
256
-
257
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
258
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
259
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
260
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"