بدائل البحث:
deer algorithm » search algorithm (توسيع البحث)
developing b » developing a (توسيع البحث), developing _ (توسيع البحث)
element deer » elementi per (توسيع البحث)
b algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
developing b » developing a (توسيع البحث), developing _ (توسيع البحث)
element deer » elementi per (توسيع البحث)
b algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
-
1
-
2
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
3
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
-
4
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
منشور في 2020"…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
5
-
6
-
7
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
منشور في 2022"…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
-
8
-
9
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
منشور في 2024"…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …"
-
10
-
11
A hybrid graph representation for recursive backtracking algorithms
منشور في 2017"…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We evaluate our algorithm on proteins taken from a Protein Data Bank. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
14
A Scatter search algorithm for exam scheduling. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
15
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
منشور في 2023"…<p dir="ltr">Cohen syndrome (CS) is a rare multisystem autosomal recessive disorder associated with mutations in VPS13B (vacuolar protein sorting homolog 13B). The NAPB-related neurodevelopmental disorder is characterized mainly by early-onset epileptic encephalopathy (EOEE) and is associated with mutations in NAPB that encodes for SNAP-beta (soluble NSF attachment protein beta). …"
-
16
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
منشور في 2019احصل على النص الكامل
doctoralThesis -
17
-
18
-
19
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …"
-
20
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis