بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
elements per » elementi per (توسيع البحث), elements _ (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
elements per » elementi per (توسيع البحث), elements _ (توسيع البحث)
-
41
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
42
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
43
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
44
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
منشور في 2022"…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …"
احصل على النص الكامل
-
45
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
-
46
Downlink channel estimation for IMT-DS
منشور في 2001"…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …"
احصل على النص الكامل
احصل على النص الكامل
article -
47
On the complexity of multi-parameterized cluster editing
منشور في 2017"…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
48
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
49
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
-
50
Activity-level space scheduling
منشور في 1992"…Its output layouts can be used to refine individual robot's trajectories using traditional path-planning algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
51
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
-
52
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
53
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
54
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
55
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
-
56
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
57
YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images
منشور في 2025"…It has recently become increasingly popular to apply deep learning algorithms to the identification of ships in SAR images. …"
-
58
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
59
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
منشور في 1997"…High resolution signal processing techniques involving higher-order statistics (HOS) and artificial neural networks (ANN) which re useful in ultrasonic nondestructive evaluation (NDE) of materials systems subject to additive white Gaussian noise (AWGN) and masking effects of measurement systems used and propagation paths, are investigated in this Thesis. The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
احصل على النص الكامل
masterThesis -
60
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article