بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
141
Parametric Design Optimization in Sustainable Urban Design: In Hot Climate
منشور في 2012"…The application of suggested methodologies on real life case put it under test to evaluate its viability, precise of prediction and the outcome benefits to the practical current urban design processes. This research aims also to investigate the applicability and integration of the proposed methodologies within the current conventional urban design methodologies by investigating parameters and urban morphologies which are available and common in the conventional urban design which makes these methodologies less burden on the design team when applied.…"
احصل على النص الكامل
-
142
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
143
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
144
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
145
-
146
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
منشور في 2024"…For cases in which Ornge air services and land ambulance medical transport were both involved in a patient transport process, data were merged and time intervals of the transport journey were determined. …"
-
147
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…A detailed analysis of the ML pipelines is provided, and the in-demand methods and algorithms are summarized in augmentative tables and figures. …"
احصل على النص الكامل
article -
148
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
منشور في 1997"…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
احصل على النص الكامل
masterThesis -
149
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
150
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …"
-
151
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
152
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
153
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …"
-
154
-
155
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
156
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
157
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. …"
-
158
CEAP
منشور في 2016"…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
159
An XML Document Comparison Framework
منشور في 2001"…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
160
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
منشور في 2011"…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article