بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
-
21
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
22
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
23
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both to reduce execution time and improve fault coverage. …"
احصل على النص الكامل
article -
24
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both the reduce execution time and improve fault coverage. …"
احصل على النص الكامل
احصل على النص الكامل
article -
25
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
26
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
27
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
28
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
منشور في 2006"…Adaptive tracking of nonlinear dynamic plants is an essential element of many control applications. The main difficulty felt in establishing the tracking of nonlinear dynamic plants is the computational complexity in controller design. …"
احصل على النص الكامل
احصل على النص الكامل
article -
29
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…These attempts suffered from a major drawback which is the almost full Jacobian matrix of the nonlinear system of equations. This work presents a new approach for solving the fully coupled isothermal elastohydrodynamic problem using a finite element discretization of the corresponding equations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
30
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…In this paper, we describe a new approach for XML keyword search aiming to solve the limitations mentioned above. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
31
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
-
32
On the complexity of multi-parameterized cluster editing
منشور في 2017"…As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
33
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
34
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
-
35
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …"
-
36
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
37
-
38
UML-based regression testing for OO software
منشور في 2010"…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
39
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
منشور في 2020احصل على النص الكامل
doctoralThesis -
40
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …"