Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
fbe algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements fbe » elements _ (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
fbe algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements fbe » elements _ (Expand Search)
-
241
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. …”
-
242
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
243
-
244
Meta-Heuristic Procedures for the Multi-Resource Leveling Problem with Activity Splitting
Published 2011Get full text
doctoralThesis -
245
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
Published 2022“…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. …”
Get full text
-
246
-
247
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
Published 2021“…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …”
Get full text
Get full text
-
248
-
249
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
Get full text
-
250
An easy-to-use scalable framework for parallel recursive backtracking
Published 2013“…Solving NP-hard graph problems to optimality using exact algorithms is an example of an area in which there has so far been limited success in obtaining large scale parallelism. …”
Get full text
Get full text
Get full text
article -
251
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
-
252
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
253
Using machine learning for disease detection. (c2013)
Published 2016Get full text
Get full text
masterThesis -
254
-
255
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
256
-
257
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
258
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
259
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
260
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”