بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
regulating » regulations (توسيع البحث), regulation (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
regulating » regulations (توسيع البحث), regulation (توسيع البحث)
-
641
-
642
Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor
منشور في 2007"…This multiplier hardware is furthermore adjusted to have area flexibility feature, which is used as the basic block in modeling a complete projective coordinate GF(2k) ECC coprocessor.…"
احصل على النص الكامل
احصل على النص الكامل
article -
643
-
644
Multi-Objective Optimization for Food Availability under Economic and Environmental Risk Constraints
منشور في 2024"…Utilizing these assessments, a multi-objective optimization model is developed and solved using MATLAB (R2018a)’s Genetic Algorithm, aiming to identify optimal suppliers to meet Qatar’s food demand, with consideration of the economic, environmental, and risk factors. …"
-
645
Collaborative Caching for D2D Content Sharing in 5G
منشور في 2021احصل على النص الكامل
doctoralThesis -
646
Creating and detecting fake reviews of online products
منشور في 2022"…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. …"
-
647
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …"
-
648
Parallel processing
منشور في 2005"…The parallel genetic algorithm is based on a model of natural evolution. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
649
A Novel Centrality-Based Approach for Link Prediction
منشور في 2025"…Namely, we consider weighted betweenness, closeness and Katz centralities, in addition to the Resource Allocation and Adamic-Adar indices. We also use a genetic algorithm to optimize the weights of these metrics, reflecting their contributions to link prediction. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
650
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
-
651
-
652
An automated temporal partitioning tool for a class of DSP applications
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
653
Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls
منشور في 2025"…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …"
احصل على النص الكامل
-
654
Enhancing e-learning through AI: advanced techniques for optimizing student performance
منشور في 2024"…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …"
-
655
Control of cardiac alternans by mechanical and electrical feedback
منشور في 2014"…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …"
احصل على النص الكامل
article -
656
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
منشور في 2023"…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …"
احصل على النص الكامل
-
657
-
658
Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose
منشور في 2020"…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …"
-
659
Improving the security of SNMP in wireless networks
منشور في 2017"…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
660
Robustness evaluation of real-Time Protocols
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject