بدائل البحث:
implementing context » implementing iot (توسيع البحث)
context algorithm » control algorithm (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
erf algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element erf » elementi per (توسيع البحث)
implementing context » implementing iot (توسيع البحث)
context algorithm » control algorithm (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
erf algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element erf » elementi per (توسيع البحث)
-
1
-
2
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
3
-
4
Correlation Clustering via s-Club Cluster Edge Deletion
منشور في 2023"…In addition, we implement this 3CCED algorithm in the heuristic approach and compare the experiments to Cluster Editing and 2CCED. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
5
-
6
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
7
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
منشور في 2017"…In certain penetration events the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
Developing a framework for using face recognition in transit payment transactions
منشور في 2021"…The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …"
احصل على النص الكامل
-
9
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In certain penetration events it is proposed that the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
10
Mobile Energy Storage Systems for Benefit Maximization in Resilient Smart Grids
منشور في 2025احصل على النص الكامل
doctoralThesis -
11
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
12
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
منشور في 2022"…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …"
-
13
AI-based remaining useful life prediction and modelling of seawater desalination membranes
منشور في 2024احصل على النص الكامل
doctoralThesis -
14
Detection of statistically significant network changes in complex biological networks
منشور في 2017"…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…"
-
15
Enhancing e-learning through AI: advanced techniques for optimizing student performance
منشور في 2024"…The findings demonstrate that CNN outperformed other deep learning and machine learning algorithms in terms of accuracy during the prediction phase, showcasing the advanced capabilities of AI in educational contexts. …"
-
16
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
منشور في 2023"…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …"
-
17
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
منشور في 2021"…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …"
-
18
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
منشور في 2025"…This study contributes to the literature by offering practical insights into the use of AI for inclusive education and as well outlining key challenges that must be addressed in order to get effective AI implementation. The significance of this research stems from its focus on a rarely explored context providing valuable insights into how AI can be leveraged to enhance inclusive education in similar educational settings. …"
احصل على النص الكامل
-
19
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"