بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
research algorithm » search algorithm (توسيع البحث)
waste processing » image processing (توسيع البحث), text processing (توسيع البحث), melt processing (توسيع البحث)
do research » _ research (توسيع البحث)
update » updated (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
research algorithm » search algorithm (توسيع البحث)
waste processing » image processing (توسيع البحث), text processing (توسيع البحث), melt processing (توسيع البحث)
do research » _ research (توسيع البحث)
update » updated (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network
منشور في 2020"…<p dir="ltr">The present study evaluates the effect of co-digestion of agricultural solid wastes (ASWs), cow manure (CM), and the application of chemical pre-treatment with NaHCO<sub>3</sub> on the performance of anaerobic digestion (AD) process. …"
-
6
-
7
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…The model to shortlist contractors in the tendering phase was created using machine learning to enable more contractors to submit for a project without having to waste time and money on the tendering process; if they are compatible with the project, then they have a high chance of getting it by being short-listed for the project, which they can then submit their tender package for; this will also ensure that the best company gets the job for the client which will act as a great step towards improving the tendering in construction projects. …"
احصل على النص الكامل
-
8
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
منشور في 2012احصل على النص الكامل
doctoralThesis -
9
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Moreover, preventing attacks to TCP/IP networks and what are the most efficient techniques to protect it, is the most targeted research area for security experts. For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
احصل على النص الكامل
-
10
-
11
Regression testing web services-based applications
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
The monotone circuit value problem with bounded genus is in NC
منشور في 2017"…We present an efficient parallel algorithm for the general Monotone Circuit Value Problem (MCVP) with n gates and an underlying graph of bounded genus k. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
-
14
-
15
Improving the security of SNMP in wireless networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
16
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
منشور في 2012احصل على النص الكامل
doctoralThesis -
17
The maximum common subgraph problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
18
-
19
-
20
Design and implementation of a deep learning-empowered m-Health application
منشور في 2023"…<p dir="ltr">Many people are unaware of the severity of melanoma disease even though such a disease can be fatal if not treated early. This research aims to facilitate the diagnosis of melanoma disease in people using a mobile health application because some people do not prefer to visit a dermatologist due to several concerns such as feeling uncomfortable by exposing their bodies. …"