بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
element » elements (توسيع البحث)
-
561
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
منشور في 2020"…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
562
-
563
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
564
-
565
-
566
-
567
Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants
منشور في 2021"…growth factor of the given perturbation series provided that one of the denominator parameters of the hypergeometric approximant takes large values. The algorithm with the new parametrization has been tested using two quantum mechanical problems where one can incorporate the weak-coupling, strong-coupling and large-order information. …"
-
568
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text
منشور في 2001"…In this work, a technique is presented that segments handwritten Arabic text. A conventional algorithm is used for the initial segmentation of the text into connected blocks of characters. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
569
Fast, effective vertex cover kernelization
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
570
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
منشور في 2025"…Given the complexity of the LDTP solution for managing online requests, we propose a real-time, lightweight solution using multi-agent meta-reinforcement learning. Our approach is tested on CNN networks and benchmarked against state-of-the-art conventional reinforcement learning algorithms. …"
-
571
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
572
Machine Learning-based X-Ray Projection Interpolation for Improved 4D-CBCT Reconstruction
منشور في 2024"…Respiration-correlated cone-beam computed tomography (4D-CBCT) is an X-ray-based imaging modality that uses reconstruction algorithms to produce time-varying volumetric images of moving anatomy over a cycle of respiratory motion. …"
احصل على النص الكامل
article -
573
Virtual topologies for massively parallel computations. (c2015)
منشور في 2015"…To address this issue, we propose virtual topologies: an architecture-oblivious communication graph imposed on top of the physical network to limit and manage core-to-core communication. Using the Cluster Editing problem as a case study, we show that managed cooperation, coupled with an efficient task generation and load balancing strategy, is capable of dramatically reducing the communication overhead and improving the computational throughput.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
574
Machine Learning-Based Approach for EV Charging Behavior
منشور في 2021احصل على النص الكامل
doctoralThesis -
575
Localizing-ground Transmitters Using Airborne Antenna Array
منشور في 2020احصل على النص الكامل
doctoralThesis -
576
-
577
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
578
-
579
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
580
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …"