بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
case finding » cam binding (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
case finding » cam binding (توسيع البحث)
element » elements (توسيع البحث)
-
101
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …"
-
102
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …"
احصل على النص الكامل
-
103
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
منشور في 2019"…Next, we propose an extension algorithm to further minimize the UAV’s flight distance for cases where the initial and final UAV locations are known a priori. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
104
-
105
On the complexity of bilinear computations
منشور في 1984"…We will also consider special classes of three bilinear forms, and efficient algorithms will be developed, which are optimal in most cases.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
106
Localizing-ground Transmitters Using Airborne Antenna Array
منشور في 2020احصل على النص الكامل
doctoralThesis -
107
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
108
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
109
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
110
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
111
Automatic image quality evaluation in digital radiography using for‐processing and for‐presentation images
منشور في 2024"…No effect of additional filtration on any of the IQ metrics was detected on images of either type. An interesting finding of the study was that for all different image acquisition selections the d’ scores were larger in raw images, whereas the other IQ metrics were larger in clinical images for most of the cases.…"
-
112
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
113
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
114
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
منشور في 2019"…Our objective is to find the minimum power that satisfies a specific SC for both cases. …"
-
115
AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients
منشور في 2015"…In this paper, we propose and compare three techniques two of which are Artificial Intelligence techniques, namely C4.5 and Case-Based Reasoning, and the third one is a meta-heuristic namely genetic algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
article -
116
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…The second case was 6-classes classification which consists of six different cyberbullying types. …"
احصل على النص الكامل
-
117
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
منشور في 2024"…The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …"
-
118
BioNetApp: An interactive visual data analysis platform for molecular expressions
منشور في 2019"…This study case demonstrates the effectiveness of the BioNetApp software as an interactive visual analysis tool for molecular expression data in systems biology. …"
-
119
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
120
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article