بدائل البحث:
showed algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element based » event based (توسيع البحث)
showed algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element based » event based (توسيع البحث)
-
141
Central schemes for ideal magnetohydrodynamics
منشور في 2007"…The div·B = 0 constraint on the magnetic field is enforced with a suitable adaptation of the constrained transport method to our central schemes. Numerical experiments show the feasibility of the proposed methods and our results are in good agreement with existing results in the recent literature. (© 2008 WILEY‐VCH Verlag GmbH & Co. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
142
Regression Testing of Database Applications
منشور في 2002"…Finally, a maintenance environment for database applications is described. Our experience with this regression testing methodology shows that the impact analysis technique is adequate for selecting regression tests and that phase 2 techniques can be used for further reduction in the number of theses tests.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
143
-
144
A hybrid Harris Hawks optimizer for economic load dispatch problems
منشور في 2022"…The results show that the proposed algorithm can achieve a significant performance for the majority of the experimented cases. …"
احصل على النص الكامل
-
145
Finite volume central schemes for three-dimensional ideal MHD
منشور في 2008"…The div.B = 0 constraint on the magnetic field is enforced with a suitable adaptation of the constrained transport method to our central schemes. Numerical experiments show the feasibility of these methods and our results are in good agreement with existing results in the literature.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
146
-
147
UML-based regression testing for OO software
منشور في 2010"…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
148
Depthwise Separable Convolutions and Variational Dropout within the context of YOLOv3
منشور في 2020"…We also explore variational dropout: a technique that finds individual and unbounded dropout rates for each neural network weight. Experiments on the PASCAL VOC benchmark dataset show promising results where variational dropout combined with the most efficient YOLOv3 variant lead to an extremely sparse solution that reduces 95% of the baseline network’s parameters at a relatively small drop of 3% in accuracy.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
149
Internal Model Control Structure Using Adaptive Inverse Control Strategy
منشور في 2003"…Computer simulation results and the outcomes of real-time experiment are included in the paper to show the effectiveness of the proposed method.…"
احصل على النص الكامل
احصل على النص الكامل
article -
150
-
151
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
152
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
منشور في 2020احصل على النص الكامل
doctoralThesis -
153
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
منشور في 2018"…The accuracy results show 90% for semantics-based and 72% for keyword-based. …"
احصل على النص الكامل
-
154
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
155
Cooperative Caching Policy in Fog Computing for Connected Vehicles
منشور في 2023"…Furthermore, the results showed the proposed model's effectiveness compared to traditional algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
156
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
157
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
158
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
منشور في 2022"…PCs were the most common platform used to play serious games. The most common algorithm used in the included studies was support vector machine. …"
-
159
LDSVM: Leukemia Cancer Classification Using Machine Learning
منشور في 2022"…The proposed approach evaluated better accuracy, precision, recall, and f1 scores than the other algorithms. Furthermore, the results were relatively assessed, which showed LDSVM performance. …"
-
160
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article