بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
light processing » signal processing (توسيع البحث), text processing (توسيع البحث), melt processing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
carlo algorithm » search algorithm (توسيع البحث), colony algorithm (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
light processing » signal processing (توسيع البحث), text processing (توسيع البحث), melt processing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
carlo algorithm » search algorithm (توسيع البحث), colony algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
AI-Aided Robotic Wide-Range Water Quality Monitoring System
منشور في 2024احصل على النص الكامل
article -
6
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
7
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
8
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…None of the surveys have ever comprehensively studied the use of Natural Language Processing (NLP) techniques for detection of phishing except one that shed light on the use of NLP techniques for classification and training purposes, while exploring a few alternatives. …"
احصل على النص الكامل
احصل على النص الكامل
-
9
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
احصل على النص الكامل
-
10
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
11
-
12
-
13
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
منشور في 2023"…The development of explainable artificial intelligence (XAI) systems, which attempt to give visible and interpretable explanations for AI algorithms' judgements, is a vital part of AI in healthcare. …"
احصل على النص الكامل
-
14
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…"
-
15
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
16
Autonomous Demand-Side Management in the Future Smart Grid
منشور في 2016احصل على النص الكامل
doctoralThesis -
17
Analysis of Multi-User-Based UAV System With Outdated CSI
منشور في 2024"…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …"
-
18
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
احصل على النص الكامل
article -
19
-
20
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis