بدائل البحث:
deer algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
elements deer » elementi per (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
elements deer » elementi per (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
-
21
Dynamic adaptation for video streaming over mobile devices. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
22
-
23
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
24
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
25
-
26
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
منشور في 2021احصل على النص الكامل
doctoralThesis -
27
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…The present study focuses on investigating the structural integrity of rail track sections of the high-speed railways using the Rayleigh waves generated and sensed using a fully non-contact optical Laser system. …"
احصل على النص الكامل
-
28
-
29
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
منشور في 2013"…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
30
-
31
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
32
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …"
-
33
-
34
Software defect prediction. (c2019)
منشور في 2019احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
35
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
منشور في 2019"…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …"
-
36
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
37
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
38
-
39
-
40
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
منشور في 2021"…Additionally, potential interaction between differentially expressed lncRNAs such as H19, SNHG5, and GATA2-AS1 with multiple miRNAs has been revealed. Taken together, our data provides thorough analysis of dysregulated protein-coding and non-coding RNAs in CRC highlighting numerous associations and regulatory networks thus providing better understanding of CRC.…"