بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
element » elements (توسيع البحث)
method » methods (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data learning » deep learning (توسيع البحث)
element » elements (توسيع البحث)
method » methods (توسيع البحث)
-
681
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
682
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
احصل على النص الكامل
احصل على النص الكامل
article -
683
-
684
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
685
Implementation of trust region methods in optimization. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
686
Dataset built for Arabic Sentiment Analysis
منشور في 2016"…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
احصل على النص الكامل
-
687
Inferential sensing techniques in industrial applications
منشور في 0007"…Real data from a boiler plant is used to develop the model. …"
احصل على النص الكامل
masterThesis -
688
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …"
-
689
Inertial Navigation system of In-pipe Inspection Robot
منشور في 2016احصل على النص الكامل
doctoralThesis -
690
-
691
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
منشور في 2016"…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
692
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
منشور في 2022"…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
693
-
694
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
منشور في 2023"…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
احصل على النص الكامل
-
695
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
696
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
منشور في 2024"…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
-
697
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
منشور في 2016احصل على النص الكامل
doctoralThesis -
698
-
699
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
700
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"