بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
ree algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements ree » elements _ (توسيع البحث), elementi per (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
ree algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements ree » elements _ (توسيع البحث), elementi per (توسيع البحث)
-
81
On the exact recovery of the FFT of noisy signals using a non-subtractively dither-quantized input channel
منشور في 2003"…This theory, tested with a 1-bit quantization scheme and under very noisy environments is very well supported by our simulation results. This makes the possibility of a hardware implementation of a 1-bit FFT chip a goal worth pursuing.…"
احصل على النص الكامل
احصل على النص الكامل
article -
82
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
83
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
84
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
منشور في 2007"…A prototype has been implemented to evaluate the performance of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
85
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
86
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
87
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
88
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
منشور في 2015"…This paper also discusses the cognitive radio implementation and the learning challenges foreseen in cognitive radio applications.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
89
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
90
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
91
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
92
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
93
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
94
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
95
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
96
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
97
After generative AI : preparing faculty to transform education, learning, and pedagogy
منشور في 2025"…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
bookPart -
98
-
99
Enhancing e-learning through AI: advanced techniques for optimizing student performance
منشور في 2024"…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …"
-
100