بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
backing » banking (توسيع البحث), lacking (توسيع البحث), packing (توسيع البحث)
-
281
-
282
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
-
283
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
-
284
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
285
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
286
Modelling of pollutant transport in compound open channels
منشور في 1998"…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
287
Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques
منشور في 2003"…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
288
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
منشور في 2023"…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …"
-
289
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …"
-
290
DASSI: differential architecture search for splice identification from DNA sequences
منشور في 2022"…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
-
291
-
292
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
293
-
294
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
295
The multi-parameterized cluster editing problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
296
Localizing-ground Transmitters Using Airborne Antenna Array
منشور في 2020احصل على النص الكامل
doctoralThesis -
297
-
298
Scatter search technique for exam timetabling
منشور في 2011"…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
299
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
-
300
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis