بدائل البحث:
carlo algorithm » search algorithm (توسيع البحث), colony algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
carlo algorithm » search algorithm (توسيع البحث), colony algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
-
21
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
22
Evolutionary algorithms for state justification in sequential automatic test pattern generation
منشور في 2005"…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both to reduce execution time and improve fault coverage. …"
احصل على النص الكامل
article -
23
-
24
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
منشور في 2021احصل على النص الكامل
doctoralThesis -
25
The Assessment and Allocation of Public Private Partnership Risks in the UAE
منشور في 2022احصل على النص الكامل
doctoralThesis -
26
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
منشور في 2015احصل على النص الكامل
doctoralThesis -
27
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
منشور في 2013"…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
28
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
منشور في 2021"…Further studies could also include strategies for the identification and reconstruction of those new sequences and hypergraphs.…"
احصل على النص الكامل
-
29
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
30
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …"
-
31
-
32
-
33
-
34
Analysis of Multi-User-Based UAV System With Outdated CSI
منشور في 2024"…The impact of decode-and-forward (DF) based relaying and outdated channel state information is assessed at the receiver nodes. …"
-
35
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
منشور في 2022"…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …"
-
36
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
37
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
38
-
39
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
منشور في 1997"…Performance evaluation of the proposed methods and comparisons with existing methods are made by means of Monte-Carlo simulations, experimental data and analysis. …"
احصل على النص الكامل
masterThesis -
40
Correlation Clustering with Overlaps
منشور في 2020"…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis