بدائل البحث:
system algorithm » swarm algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
implementing » implemented (توسيع البحث)
element » elements (توسيع البحث)
system algorithm » swarm algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
implementing » implemented (توسيع البحث)
element » elements (توسيع البحث)
-
181
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
182
AI-based remaining useful life prediction and modelling of seawater desalination membranes
منشور في 2024احصل على النص الكامل
doctoralThesis -
183
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
-
184
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
احصل على النص الكامل
article -
185
Information warfare
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
186
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
منشور في 2021"…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
-
187
Comparative Study of Control Strategies for Under Actuated Manipulator
منشور في 2006احصل على النص الكامل
doctoralThesis -
188
Optimal shunt compensators at nonsinusoidal busbars
منشور في 1995احصل على النص الكامل
احصل على النص الكامل
article -
189
-
190
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …"
احصل على النص الكامل
article -
191
-
192
-
193
-
194
Enhancing e-learning through AI: advanced techniques for optimizing student performance
منشور في 2024"…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …"
-
195
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
196
-
197
Scheduling and allocation in high-level synthesis using stochastic techniques
منشور في 2020"…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. Operation scheduling and hardware allocation are the two most important phases in the synthesis of circuits from behavioral specification. …"
احصل على النص الكامل
article -
198
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
احصل على النص الكامل
احصل على النص الكامل
article -
199
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
منشور في 2023"…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …"
احصل على النص الكامل
-
200