بدائل البحث:
forest algorithm » firefly algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
forest algorithm » firefly algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
-
101
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
منشور في 1996"…In addition, the effect of ion penetration on reducing the positive conductor corona inception voltage is also studied. The present algorithm is applied to different laboratory and full scale transmission line configurations. …"
احصل على النص الكامل
احصل على النص الكامل
article -
102
Charge and reduce
منشور في 2015"…We prove that String-to-String Correction is fixed-parameter tractable, for parameter k, and present a simple fixed-parameter algorithm that solves the problem in O(2kn) time. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
103
On the parameterized parallel complexity and the vertex cover problem
منشور في 2016"…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
104
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
منشور في 2023"…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …"
-
105
On Single Source Reachability Improvement
منشور في 2022"…We show the NP hardness and present an effective polynomial-time greedy algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
106
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
منشور في 2019احصل على النص الكامل
doctoralThesis -
107
A new estimator and approach for estimating the subpopulation parameters
منشور في 2021"…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …"
-
108
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
احصل على النص الكامل
article -
109
An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications
منشور في 2017"…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
110
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
111
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
112
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
113
Optimizing ADWIN for Steady Streams
منشور في 2022"…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
114
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
منشور في 2019احصل على النص الكامل
doctoralThesis -
115
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
منشور في 2020"…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
116
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
117
Auto Takeoff and Precision Landing using Integrated GPS/INS/Optical Flow Solution
منشور في 2015احصل على النص الكامل
doctoralThesis -
118
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…A new low-cost and efficient technology is presented to measure and contrast vehicles' vertical accelerations over smooth and rough pavement sections. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
119
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
120
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
منشور في 2021"…However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. …"