بدائل البحث:
developing based » developing a (توسيع البحث), developing 21st (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
developing based » developing a (توسيع البحث), developing 21st (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
841
Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid
منشور في 2022"…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …"
-
842
Automatic White Blood Cell Differential Classification
منشور في 2005احصل على النص الكامل
doctoralThesis -
843
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
منشور في 2025"…To this end, three model-free DRL-based methods, based on deep deterministic policy gradient (DDPG), twin delayed deep deterministic policy gradient (TD3), and TD3 enhanced with curriculum learning (CL TD3), are developed for determining optimal yaw moment control and energy optimization online. …"
-
844
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
845
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
منشور في 2021"…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …"
-
846
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
847
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
848
Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression
منشور في 2023"…Further studies are needed to examine the performance of wearable AI based on a combination of wearable device data and neuroimaging data and to distinguish patients with depression from those with other diseases.…"
-
849
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
850
-
851
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
منشور في 2023"…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …"
-
852
Single-channel speech denoising by masking the colored spectrograms
منشور في 2025"…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …"
-
853
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
منشور في 2011"…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
854
Humanizing AI in medical training: ethical framework for responsible design
منشور في 2023"…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …"
-
855
-
856
Comparative Study on Arabic Text Classification: Challenges and Opportunities
منشور في 2022"…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…"
احصل على النص الكامل
-
857
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
858
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
منشور في 2023"…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"
-
859
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
منشور في 2025"…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …"
احصل على النص الكامل
-
860
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article