بدائل البحث:
experiments each » experiments approach (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
update » updated (توسيع البحث)
experiments each » experiments approach (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
update » updated (توسيع البحث)
-
1
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
منشور في 2015احصل على النص الكامل
doctoralThesis -
2
-
3
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…This paper aims to identify the impact of each design parameter on the shear behavior of BFRC-BFRP one-way slabs using a fractional factorial design of experiment (DOE). …"
-
4
-
5
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
6
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
منشور في 2012احصل على النص الكامل
doctoralThesis -
7
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
8
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
9
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
منشور في 2023"…An Enhanced Chameleon Swarm Algorithm (ECSA) by integrating roulette wheel selection and Lévy flight methods is presented to solve non-convex Economic Load Dispatch (ELD) problems. …"
احصل على النص الكامل
-
10
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
منشور في 2021"…A dataset was created by acquiring both keystroke dynamics and EEG signals simultaneously from 10 users. Each user participated in 500 trials at 10 different sessions (days) to replicate real-life signal variability. …"
-
11
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
12
-
13
Content-Aware Adaptive Video Streaming Using Actor-Critic Deep Reinforcement Learning
منشور في 2024احصل على النص الكامل
doctoralThesis -
14
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
منشور في 2023"…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …"
-
15
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
16
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …"
احصل على النص الكامل
-
17
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
منشور في 2012احصل على النص الكامل
doctoralThesis -
18
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
19
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
منشور في 2022"…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. Numerical experiments show the efficiency of the proposed approach compared to the CVX and the extended adaptive ellipsoid-based algorithm.…"
-
20
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …"
احصل على النص الكامل