بدائل البحث:
during algorithm » scheduling algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
coa algorithm » jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
during algorithm » scheduling algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
coa algorithm » jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
-
121
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
122
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
منشور في 2024احصل على النص الكامل
doctoralThesis -
123
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
منشور في 2024"…Key measurements included complete blood count, lipid panel, HbA1c, and ferritin levels. Our findings indicated elevated body mass index (BMI) and triglyceride (TG) levels in both patient groups compared to controls. …"
-
124
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
125
Severity-Based Prioritized Processing of Packets with Application in VANETs
منشور في 2019"…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
-
126
A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems
منشور في 2021"…The GRASP algorithm is used for case studies on several public transport systems having various properties and sizes. …"
-
127
Improving Active Resonance Damping and Unbalanced Voltage Mitigation Based on Combined DDSRF and Washout Filter in Islanded Microgrids
منشور في 2024"…Finally, Level 4 integrates a controller based on extracting positive and negative sequence components using the dual decoupled synchronous reference frame (DDSRF) algorithm. …"
-
128
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
منشور في 2023احصل على النص الكامل
doctoralThesis -
129
Regression Testing of Database Applications
منشور في 2002"…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
130
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
131
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
منشور في 2022"…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …"
-
132
Regression testing web services-based applications
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
133
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
134
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Several issues were observed during the experiments, which are noted as follows. …"
احصل على النص الكامل
-
135
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
منشور في 2009احصل على النص الكامل
doctoralThesis -
136
Uplink channel estimation for IMT-DS system
منشور في 2001"…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…"
احصل على النص الكامل
احصل على النص الكامل
article -
137
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
138
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
منشور في 2016"…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
139
-
140
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"