بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
time processing » image processing (توسيع البحث), text processing (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
time processing » image processing (توسيع البحث), text processing (توسيع البحث)
-
101
-
102
-
103
-
104
Virtual topologies for massively parallel computations. (c2015)
منشور في 2015احصل على النص الكامل
احصل على النص الكامل
masterThesis -
105
A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm
منشور في 2023"…In this study, features were extracted from signals in time, frequency, and time–frequency domains. The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …"
-
106
-
107
On-site workshop investment problem: A novel mathematical approach and solution procedure
منشور في 2023"…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …"
-
108
Toward automatic motivator selection for autism behavior intervention therapy
منشور في 2022"…Analysis of the algorithm performance showed promising results and indicated improvement of the recommendations over time.…"
احصل على النص الكامل
احصل على النص الكامل
-
109
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
110
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS-A proposes a dynamic algorithm to compute the exact time for nodes cleansing states and restricts the exposure window of the nodes. …"
-
111
-
112
-
113
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…This research has generated a base model that can be altered depending on the project requirements which can assist all parties involved within the tendering process to save time and money and improve the success rate of projects. …"
احصل على النص الكامل
-
114
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
منشور في 2012احصل على النص الكامل
doctoralThesis -
115
A clustering metaheuristic for large orienteering problems
منشور في 2022"…The obtained solutions are then merged to form a solution for the original problem, and then further optimized and processed to ensure feasibility. The metaheuristic aims to dramatically improve the computation time of a given Orienteering Problem algorithm without a significant decrease in the solution quality of that algorithm, especially for large Orienteering Problems. …"
-
116
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
منشور في 2017احصل على النص الكامل
doctoralThesis -
117
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
منشور في 2022"…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
-
118
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
منشور في 2017احصل على النص الكامل
doctoralThesis -
119
A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation
منشور في 2021"…Also the proposed fitness function, as deviation characteristics of the step response in MIMO transfer function in virtual inertia emulation based HVDC model, is compared with integral time absolute error (ITAE), as the standard performance index in the optimization process. …"
-
120
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل