بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
search » research (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
search » research (توسيع البحث)
-
461
-
462
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
منشور في 2007"…In this paper, we provide an improved comparison method to deal with such resemblances. Our approach is based on the concept of tree edit distance, introducing the notion of commonality between sub-trees. …"
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
463
Fine-grain watermarking for intellectual property protection
منشور في 2019"…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …"
-
464
A fine-grained XML structural comparison approach
منشور في 2007"…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
465
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
466
An XML Document Comparison Framework
منشور في 2001"…A prototype has been developed to evaluate the optimality and performance of our method. Results demonstrate higher comparison accuracy with respect to alternative XML comparison methods, while timing experiments reflect the significant impact of semantic similarity assessment on overall system performance.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
467
Inertial Navigation system of In-pipe Inspection Robot
منشور في 2016احصل على النص الكامل
doctoralThesis -
468
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
469
Developing a framework for using face recognition in transit payment transactions
منشور في 2021"…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …"
احصل على النص الكامل
-
470
Failure recovery in wireless content distribution networks with device-to-device cooperation
منشور في 2017"…We present low complexity effective algorithms based on clustering and tree construction methods in order to address three different types of dynamic node behavior, namely new devices joining the network, existing devices leaving the network, and existing devices moving locally within the network. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
471
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
منشور في 2021"…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …"
احصل على النص الكامل
-
472
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
منشور في 2023احصل على النص الكامل
doctoralThesis -
473
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
474
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
منشور في 2018"…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …"
-
475
Approximate XML structure validation technical report
منشور في 2014"…Our method also inherently performs exact validation by imposing a maximum similarity threshold (minimum edit distance) on the returned results. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
476
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
477
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
منشور في 2022"…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …"
-
478
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
منشور في 2021احصل على النص الكامل
doctoralThesis -
479
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
480
Quality Degradation And Pricing of Perishable Food Products
منشور في 2024احصل على النص الكامل
doctoralThesis