بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
notes using » sites using (توسيع البحث), cities using (توسيع البحث), waters using (توسيع البحث)
element » elements (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
notes using » sites using (توسيع البحث), cities using (توسيع البحث), waters using (توسيع البحث)
element » elements (توسيع البحث)
-
41
On the parameterized parallel complexity and the vertex cover problem
منشور في 2016"…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
42
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
43
SemIndex: Semantic-Aware Inverted Index
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
44
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
45
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
46
Structural similarity evaluation between XML documents and DTDs
منشور في 2007"…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
47
-
48
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
49
-
50
Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches
منشور في 2018"…The PV output, soiling rates, electricity price, and cleaning costs were inputted into the algorithm and 5 different approaches were simulated: 1. …"
احصل على النص الكامل
-
51
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
منشور في 2016"…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
52
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
53
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
منشور في 2022"…The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …"
-
54
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
منشور في 2024"…Variations in inflammatory markers were noted, with the NTRS group exhibiting a higher platelet/lymphocyte ratio (PLR). …"
-
55
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
56
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
57
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
-
58
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
59
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
60
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"