بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
search » research (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
search » research (توسيع البحث)
-
161
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
منشور في 2015احصل على النص الكامل
doctoralThesis -
162
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
منشور في 2020"…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …"
-
163
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
منشور في 2025"…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. The most employed ML algorithms were random forest, logistics regression, and gradient boosting. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
Precision nutrition: A systematic literature review
منشور في 2021"…As such, recent research has applied machine learning algorithms, tools, and techniques in precision nutrition for different purposes. …"
-
165
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
منشور في 2020"…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …"
-
166
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
167
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
منشور في 2025"…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. The most employed ML algorithms were random forest, logistics regression, and gradient boosting. …"
-
168
UML-based regression testing for OO software
منشور في 2010"…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
169
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
منشور في 2020احصل على النص الكامل
doctoralThesis -
170
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
171
A fine-grained XML structural comparison approach
منشور في 2007"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
172
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
منشور في 2025"…<p>The energy internet (EI) is evolving toward decentralized, data-rich, and time-critical operation, where legacy optimization often fails to meet complexity, scalability, and real-time constraints. …"
-
173
Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine
منشور في 2025"…Ethical considerations, such as safeguarding patient privacy, ensuring data security, and mitigating algorithmic bias, underscore the importance of responsible AI integration. …"
-
174
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
منشور في 2018"…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
175
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
احصل على النص الكامل
-
176
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
منشور في 2007"…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
177
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
-
178
Cyberbullying Detection Model for Arabic Text Using Deep Learning
منشور في 2023"…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
احصل على النص الكامل
احصل على النص الكامل
-
179
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
180
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
منشور في 2017"…We formulate the problem as an optimization that aims at maximizing the number of served users while maintaining target quality of service using device-to-device cooperation, in-device caching, and intelligent channel allocation. Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis