بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
system models » system modeling (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
system models » system modeling (توسيع البحث)
-
881
-
882
A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems
منشور في 2021"…The GRASP algorithm is used for case studies on several public transport systems having various properties and sizes. …"
-
883
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
منشور في 2023"…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
احصل على النص الكامل
-
884
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
منشور في 2024"…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
-
885
The role of Reinforcement Learning in software testing
منشور في 2023"…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
-
886
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
منشور في 2016احصل على النص الكامل
doctoralThesis -
887
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
888
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
889
Machine Learning-Based Approach for EV Charging Behavior
منشور في 2021احصل على النص الكامل
doctoralThesis -
890
-
891
-
892
-
893
Artificial Intelligence for Skin Cancer Detection: Scoping Review
منشور في 2021"…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…"
-
894
Axes-Based Encryption Key
منشور في 2018"…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
895
-
896
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
897
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
منشور في 2021"…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …"
-
898
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
منشور في 2025"…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …"
-
899
-
900
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis