بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
-
21
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
منشور في 2024"…The proposed framework comprises key elements: Important Decisions derived from interviews with transportation leaders, Knowledge Management enhanced by AI algorithms, Data Mining/Analysis utilizing historical data, the Fleet Management System employing Oracle ERP, and a Data-Driven Decision Support Framework that leans towards the extended framework approach. …"
احصل على النص الكامل
-
22
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
منشور في 2019احصل على النص الكامل
doctoralThesis -
23
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
24
-
25
Correlation Clustering with Overlaps
منشور في 2020"…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
26
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
27
-
28
-
29
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …"
احصل على النص الكامل
-
30
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
31
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
منشور في 2020"…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …"
احصل على النص الكامل
article -
32
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
احصل على النص الكامل
احصل على النص الكامل
article -
33
Structural similarity evaluation between XML documents and DTDs
منشور في 2007"…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
34
-
35
Information Warfare
منشور في 2015احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
36
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
منشور في 2017"…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
37
PERF solutions for distributed query optimization. (c1999)
منشور في 1999احصل على النص الكامل
احصل على النص الكامل
masterThesis -
38
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"
-
39
Neural network-based failure rate prediction for De Havilland Dash-8 tires
منشور في 2006"…An artificial neural network (ANN) model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the twolayered feed-forward back-propagation algorithm as a learning rule is developed. …"
احصل على النص الكامل
article -
40
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
منشور في 2020"…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …"
احصل على النص الكامل
article