بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
would algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
would algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
321
Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics
منشور في 2020"…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …"
احصل على النص الكامل
article -
322
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
منشور في 2017احصل على النص الكامل
doctoralThesis -
323
Dynamic Layout Planning Using a Hybrid Incremental Solution Method
منشور في 1999"…Efficiently using site space to accommodate resources throughout the duration of a construction project is a critical problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
324
Mobile Robot Navigation in Dynamic Environments Using an Improved RRT* Approach
منشور في 2018احصل على النص الكامل
doctoralThesis -
325
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
326
-
327
Correlation Clustering via s-Club Cluster Edge Deletion
منشور في 2023احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
328
-
329
Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection
منشور في 2019"…Therefore, to solve this problem and enhance the spatial and frequency diversity orders of large amplify and forward cooperative communication networks, in this paper, we develop three multiple relay selection and distributed beamforming techniques that exploit sparse signal recovery theory to process the subcarriers using the low complexity orthogonal matching pursuit algorithm (OMP). …"
-
330
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
منشور في 2024"…First, a policy iteration algorithm is introduced to learn the optimal solution of the associated linear-quadratic control problem online. …"
-
331
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
منشور في 2003"…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …"
احصل على النص الكامل
article -
332
Auto Takeoff and Precision Landing using Integrated GPS/INS/Optical Flow Solution
منشور في 2015احصل على النص الكامل
doctoralThesis -
333
Cuckoo search for portfolio optimization. (c2014)
منشور في 2014احصل على النص الكامل
احصل على النص الكامل
masterThesis -
334
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
335
Metallic coating thickness assessment over nonmagnetic metals using eddy current technology
منشور في 2019احصل على النص الكامل
doctoralThesis -
336
-
337
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
منشور في 2022"…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …"
-
338
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…In order to benefit from multiple different classifiers, and exploit their strengths, the use of ensembling algorithms arises, which combine the results of the individual classifiers into a final result to achieve greater precision and thus a better result. …"
احصل على النص الكامل
-
339
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
منشور في 2020احصل على النص الكامل
doctoralThesis -
340