بدائل البحث:
carlo algorithm » search algorithm (توسيع البحث), colony algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
carlo algorithm » search algorithm (توسيع البحث), colony algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
-
61
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both the reduce execution time and improve fault coverage. …"
احصل على النص الكامل
احصل على النص الكامل
article -
62
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
-
63
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
64
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
65
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
66
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
67
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
منشور في 2006"…Adaptive tracking of nonlinear dynamic plants is an essential element of many control applications. The main difficulty felt in establishing the tracking of nonlinear dynamic plants is the computational complexity in controller design. …"
احصل على النص الكامل
احصل على النص الكامل
article -
68
Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks
منشور في 2024"…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …"
-
69
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…These attempts suffered from a major drawback which is the almost full Jacobian matrix of the nonlinear system of equations. This work presents a new approach for solving the fully coupled isothermal elastohydrodynamic problem using a finite element discretization of the corresponding equations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
70
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…In this paper, we describe a new approach for XML keyword search aiming to solve the limitations mentioned above. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
71
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
72
On the complexity of multi-parameterized cluster editing
منشور في 2017"…As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
73
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
74
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
75
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
76
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
77
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
78
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
79
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …"
-
80
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …"
احصل على النص الكامل
article