بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
141
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
منشور في 2016"…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
142
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
منشور في 2022"…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …"
-
143
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
منشور في 2021احصل على النص الكامل
doctoralThesis -
144
An evolutionary approach to load balancing parallel computations
منشور في 1991"…We present a new approach to balancing the workload in a multicomputer. It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
145
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
منشور في 2009احصل على النص الكامل
doctoralThesis -
146
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
-
147
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
148
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
149
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
150
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
منشور في 2021"…<div><p>Machine learning (ML)-based prediction is considered an important technique for improving decision making during the planning process. …"
-
151
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
-
152
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
153
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis -
154
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
-
155
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
156
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
157
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
158
A hybrid neuro-fuzzy power system stabilizer for multimachine powersystems
منشور في 1998"…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on machine loading conditions. The orthogonal least squares (OLS) learning algorithm is developed for designing an adequate and parsimonious FBFN model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
159
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
منشور في 2023احصل على النص الكامل
doctoralThesis -
160