يعرض 1 - 20 نتائج من 43 نتيجة بحث عن '(((( element detection algorithm ) OR ( elements search algorithm ))) OR ( source code algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1

    On the Optimization of Band Gaps in Periodic Waveguides حسب Jamil Renno (14070771)

    منشور في 2025
    "…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …"
  2. 2
  3. 3

    Evolutionary algorithms for state justification in sequential automatic test pattern generation حسب El-Maleh, Aiman H.

    منشور في 2005
    "…Evolutionary algorithms have been effective in solving many search and optimization problems. …"
    احصل على النص الكامل
    article
  4. 4

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species حسب Saleh Musleh (15279190)

    منشور في 2021
    "…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…"
  5. 5
  6. 6

    An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications حسب Abu Zitar, Raed

    منشور في 2021
    "…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …"
    احصل على النص الكامل
  7. 7

    Adaptive bias simulated evolution algorithm for placement حسب Youssef, H.

    منشور في 2001
    "…This parameter has major impact on the algorithm run-time and the quality of the solution subspace searched. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8
  9. 9
  10. 10

    Fuzzy simulated evolution algorithm for topology design of campusnetworks حسب Youssef, H.

    منشور في 2000
    "…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS حسب Youssef, H.

    منشور في 2020
    "…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …"
    احصل على النص الكامل
    article
  12. 12

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs حسب Tarsissi, Lama

    منشور في 2021
    "…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …"
    احصل على النص الكامل
  14. 14

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study حسب Alkhodari, Mohanad Ahmed

    منشور في 2021
    "…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
    احصل على النص الكامل
    article
  15. 15

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array حسب Amran Hossain (570706)

    منشور في 2022
    "…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …"
  16. 16
  17. 17

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  18. 18
  19. 19

    Bird’s Eye View feature selection for high-dimensional data حسب Samir Brahim Belhaouari (16855434)

    منشور في 2023
    "…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
  20. 20