بدائل البحث:
research algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
element » elements (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
research algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
element » elements (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
-
21
-
22
A hybrid graph representation for recursive backtracking algorithms
منشور في 2017"…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
23
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We evaluate our algorithm on proteins taken from a Protein Data Bank. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
24
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
منشور في 2023"…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …"
-
25
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
26
-
27
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
28
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
منشور في 2021احصل على النص الكامل
doctoralThesis -
29
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
منشور في 2013"…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
30
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
منشور في 2019احصل على النص الكامل
doctoralThesis -
31
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
32
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …"
-
33
-
34
Socially Motivated Approach to Simulate Negotiation Process
منشور في 2014احصل على النص الكامل
doctoralThesis -
35
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
36
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
37
-
38
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
39
Correlation Clustering with Overlaps
منشور في 2020احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
40