بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
-
761
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
منشور في 2020احصل على النص الكامل
doctoralThesis -
762
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
منشور في 2023"…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
احصل على النص الكامل
-
763
Low-Cost Reduced Navigation System for Mobile Robot in Indoor/Outdoor Environments
منشور في 2020"…For the indoor environment, where GPS signals are blocked, another EKF algorithm is proposed using low cost depth sensor (Microsoft Kinect stream). …"
احصل على النص الكامل
article -
764
Failure recovery in wireless content distribution networks with device-to-device cooperation
منشور في 2017"…We present results for various network scenarios using simulations and experimental test bed to demonstrate the effectiveness of the proposed algorithms in terms of performance efficiency, computational complexity, and practical implementation feasibility.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
765
Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy
منشور في 2026"…Treatment plans were created using the Acuros XB algorithm in both Eclipse versions. …"
-
766
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
767
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
768
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
769
On Equivalent Circuit Model-Based State-of-Charge Estimation for Lithium-Ion Batteries in Electric Vehicles
منشور في 2025"…A third-order equivalent circuit model is employed for the LIB based on electrochemical impedance spectra test results, with model parameters identified using a particle swarm optimization algorithm. …"
-
770
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
منشور في 2024"…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
-
771
On scalable parallel recursive backtracking
منشور في 2015"…Many of these algorithms use recursive backtracking as their core solution paradigm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
772
-
773
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
منشور في 2025"…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"
-
774
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
منشور في 2025"…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"
-
775
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
776
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
777
The Assessment and Allocation of Public Private Partnership Risks in the UAE
منشور في 2022احصل على النص الكامل
doctoralThesis -
778
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
779
Machine Learning-Based Approach for EV Charging Behavior
منشور في 2021احصل على النص الكامل
doctoralThesis -
780