بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
441
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
احصل على النص الكامل
احصل على النص الكامل
article -
442
-
443
-
444
A hybrid approach for XML similarity
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
445
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
منشور في 2020"…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …"
احصل على النص الكامل
article -
446
On the complexity of multi-parameterized cluster editing
منشور في 2017"…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
447
Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes
منشور في 2019"…Then, the algorithm was used to process the five experimental datasets. …"
احصل على النص الكامل
article -
448
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
-
449
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
450
Graph contraction for physical optimization methods
منشور في 1993"…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
451
Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration
منشور في 0000"…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
452
Evacuation of a highly congested urban city
منشور في 2017"…A case study using real population and transportation network data was tested using the proposed methodology. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
453
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
454
Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant
منشور في 2007"…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…"
احصل على النص الكامل
احصل على النص الكامل
article -
455
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
منشور في 2009"…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
456
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
منشور في 2015"…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
457
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
458
Optimizing ADWIN for Steady Streams
منشور في 2022"…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
459
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
منشور في 2022"…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
-
460
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
احصل على النص الكامل