Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
waste processing » image processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
do research » _ research (Expand Search)
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
waste processing » image processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
do research » _ research (Expand Search)
-
1
Natural optimization algorithms for optimal regression testing
Published 1997Get full text
Get full text
Get full text
Get full text
conferenceObject -
2
-
3
-
4
-
5
Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network
Published 2020“…<p dir="ltr">The present study evaluates the effect of co-digestion of agricultural solid wastes (ASWs), cow manure (CM), and the application of chemical pre-treatment with NaHCO<sub>3</sub> on the performance of anaerobic digestion (AD) process. …”
-
6
-
7
Investigation of Forming a Framework to shortlist contractors in the tendering phase
Published 2022“…The model to shortlist contractors in the tendering phase was created using machine learning to enable more contractors to submit for a project without having to waste time and money on the tendering process; if they are compatible with the project, then they have a high chance of getting it by being short-listed for the project, which they can then submit their tender package for; this will also ensure that the best company gets the job for the client which will act as a great step towards improving the tendering in construction projects. …”
Get full text
-
8
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
Published 2012Get full text
doctoralThesis -
9
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Moreover, preventing attacks to TCP/IP networks and what are the most efficient techniques to protect it, is the most targeted research area for security experts. For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …”
Get full text
-
10
-
11
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
12
The monotone circuit value problem with bounded genus is in NC
Published 2017“…We present an efficient parallel algorithm for the general Monotone Circuit Value Problem (MCVP) with n gates and an underlying graph of bounded genus k. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
-
14
-
15
Improving the security of SNMP in wireless networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
16
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis -
17
The maximum common subgraph problem
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
18
-
19
-
20
Design and implementation of a deep learning-empowered m-Health application
Published 2023“…<p dir="ltr">Many people are unaware of the severity of melanoma disease even though such a disease can be fatal if not treated early. This research aims to facilitate the diagnosis of melanoma disease in people using a mobile health application because some people do not prefer to visit a dermatologist due to several concerns such as feeling uncomfortable by exposing their bodies. …”