بدائل البحث:
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
search » research (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
search » research (توسيع البحث)
-
501
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
502
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
منشور في 2020"…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
503
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
منشور في 2017"…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
-
504
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
منشور في 1997"…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …"
احصل على النص الكامل
احصل على النص الكامل
article -
505
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…Subsequently, state-of-the-art research that envisions the use of clustering-based machine learning and deep learning-based solutions for PGP is presented. …"
-
506
Towards Multimedia Fragmentation
منشور في 2006"…We particularly discuss multimedia primary horizontal fragmentation and provide a partitioning strategy based on low-level multi-media features. Our approach particularly emphasizes the importance of multimedia predicates implications in optimizing multimedia fragments. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
507
Predicting Android Malware Using Evolution Networks
منشور في 2025"…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
508
SemIndex: Semantic-Aware Inverted Index
منشور في 2017"…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
509
A fine-grained XML structural comparison approach
منشور في 2007"…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
510
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
511
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
احصل على النص الكامل
احصل على النص الكامل
-
512
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
منشور في 2020احصل على النص الكامل
doctoralThesis -
513
Current trends and future orientation in diagnosing lung pathologies: A systematic survey
منشور في 2025"…Additionally, it emphasized the necessity for further research to optimize their performance and clinical usefulness.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
514
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …"