بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
-
21
Parallel physical optimization algorithms for allocating data to multicomputer nodes
منشور في 1994"…Three parallel physical optimization algorithms for allocating irregular data to multicomputer nodes are presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
22
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
23
-
24
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
منشور في 2022"…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
25
-
26
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. …"
احصل على النص الكامل
احصل على النص الكامل
-
27
On the steiner walk problem. (c2009)
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
masterThesis -
28
A data envelopment analysis model for opinion leaders’ identification in social networks
منشور في 2024"…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
-
29
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
30
A genetic algorithm for corrective retesting. (c1995)
منشور في 1995احصل على النص الكامل
احصل على النص الكامل
masterThesis -
31
-
32
-
33
-
34
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
احصل على النص الكامل
article -
35
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
منشور في 2016"…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
36
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
37
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
منشور في 2024"…To improve the effectiveness and efficiency of the UniBFS algorithm, Redundant Features Elimination algorithm (RFE) is presented in this paper. …"
-
38
-
39
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
40
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis