بدائل البحث:
deer algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
elements deer » elementi per (توسيع البحث)
all algorithm » carlo algorithm (توسيع البحث), jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث)
based all » based alloys (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
elements deer » elementi per (توسيع البحث)
all algorithm » carlo algorithm (توسيع البحث), jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث)
based all » based alloys (توسيع البحث)
-
141
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
142
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
منشور في 2022"…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …"
احصل على النص الكامل
-
143
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
144
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
-
145
Downlink channel estimation for IMT-DS
منشور في 2001"…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …"
احصل على النص الكامل
احصل على النص الكامل
article -
146
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…This study aims to identify the technologies for user authentication and the opportunity for their transformation to mobile money transaction security despite having all the legally required data for a transaction. …"
-
147
Improving INS/GPS Integration for Mobile Robotics Applications
منشور في 2008احصل على النص الكامل
doctoralThesis -
148
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
149
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …"
-
150
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
151
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
152
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
153
GENETIC SCHEDULING OF TASK GRAPHS
منشور في 2020"…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. The objective function to be minimized is the 'time on completion\ of all tasks. …"
احصل على النص الكامل
article -
154
Optimizing clopidogrel dose response
منشور في 2016"…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
155
Timing influenced general-cell genetic floorplanner
منشور في 2020"…This phase is constraint graph based. The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …"
احصل على النص الكامل
article -
156
A method for data path synthesis using neural networks
منشور في 2017"…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
157
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
منشور في 2021"…The time of arrival (TOA) of defect waves to the sensor are extracted using the continuous wavelet transform (CWT) applied on all the residual signals and are subsequently used in the astroid algorithm to locate the damage as an enclosed area. …"
احصل على النص الكامل
-
158
Turbo-charging dominating set with an FPT subroutine
منشور في 2017"…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
159
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
احصل على النص الكامل
article -
160