بدائل البحث:
solution algorithm » auction algorithm (توسيع البحث), pollination algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
solution algorithm » auction algorithm (توسيع البحث), pollination algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
641
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
-
642
An aspect-oriented framework for systematic security hardening of software
منشور في 2008"…Accordingly, we first propose an aspect-oriented and pattern-based approach for systematic security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
643
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
644
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
منشور في 2025"…Leveraging FL enables efficient model training across diverse end-user applications while preserving data privacy. …"
-
645
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
منشور في 2022"…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
-
646
-
647
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
648
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
منشور في 2020"…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
-
649
Scatter search technique for exam timetabling
منشور في 2011"…This approach is based on maintaining and evolving a population of solutions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
650
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
651
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
منشور في 2011"…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
652
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
653
LDSVM: Leukemia Cancer Classification Using Machine Learning
منشور في 2022"…The main aim was to predict the initial leukemia disease. Machine learning algorithms such as decision tree (DT), naive bayes (NB), random forest (RF), gradient boosting machine (GBM), linear regression (LinR), support vector machine (SVM), and novel approach based on the combination of Logistic Regression (LR), DT and SVM named as ensemble LDSVM model. …"
-
654
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
-
655
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…Subsequently, state-of-the-art research that envisions the use of clustering-based machine learning and deep learning-based solutions for PGP is presented. …"
-
656
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
657
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
منشور في 2017"…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
658
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…This inherent lack of adaptability to occupants significantly hampers the effectiveness of energy-saving solutions. Moreover, the prevalent cloud-based nature of these systems introduces elevated cybersecurity risks and substantial data transmission overheads. …"
-
659
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
660
Condenser capacity and hyperbolic perimeterImage 1
منشور في 2021"…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article