بدائل البحث:
custom algorithm » control algorithm (توسيع البحث), auction algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
custom algorithm » control algorithm (توسيع البحث), auction algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
301
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …"
-
302
-
303
-
304
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
305
The multi-parameterized cluster editing problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
306
-
307
Scatter search technique for exam timetabling
منشور في 2011"…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
308
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
-
309
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis