بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
game » same (توسيع البحث), came (توسيع البحث), gave (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
game » same (توسيع البحث), came (توسيع البحث), gave (توسيع البحث)
-
61
-
62
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
63
-
64
-
65
-
66
-
67
Degree-Based Network Anonymization
منشور في 2020احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
68
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
69
Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018)
منشور في 2018"…Companies, nowadays, rely on systems and applications to automate their business processes and data management. In this context, the notion of integrating machine learning techniques in banking business processes has emerged, where trainable computational algorithms can be improved by learning. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
70
Topics in graph algorithms
منشور في 2003"…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
71
-
72
-
73
-
74
-
75
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
منشور في 2021"…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …"
-
76
-
77
-
78
-
79
-
80
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
منشور في 2021"…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …"