بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
level using » level fusion (توسيع البحث)
finding » findings (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
models using » model using (توسيع البحث)
level using » level fusion (توسيع البحث)
finding » findings (توسيع البحث)
-
741
-
742
Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls
منشور في 2025"…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …"
احصل على النص الكامل
-
743
Enhancing e-learning through AI: advanced techniques for optimizing student performance
منشور في 2024"…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …"
-
744
Control of cardiac alternans by mechanical and electrical feedback
منشور في 2014"…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …"
احصل على النص الكامل
article -
745
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
منشور في 2023"…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …"
احصل على النص الكامل
-
746
Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose
منشور في 2020"…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …"
-
747
Improving the security of SNMP in wireless networks
منشور في 2017"…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
748
Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges
منشور في 2024"…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …"
-
749
Innovative mobile E-healthcare systems
منشور في 2016"…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
750
Robustness evaluation of real-Time Protocols
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
751
Computational evluation of protein energy functions
منشور في 2014"…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
752
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
753
Exploring AI Conversational Chatbot UX Design: Insights from High School
منشور في 2025"…Advancements in state-of-the-art models and algorithms for chatbots have significantly driven the growth and evolution of human–computer interaction (HCI) in recent years. …"
احصل على النص الكامل
-
754
An intelligent EPROM silicon compiler
منشور في 1991"…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…"
احصل على النص الكامل
احصل على النص الكامل
article -
755
-
756
A machine learning approach for localization in cellular environments
منشور في 2018"…The proposed approach only assumes knowledge of RSS fingerprints of the environment, and does not require knowledge of the cellular base transceiver station (BTS) locations, nor uses any RSS mathematical model. The proposed localization scheme integrates a weighted K-nearest neighbor (WKNN) and a multilayer neural network. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
757
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis -
758
-
759
-
760
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
منشور في 2022"…FS is an important data reduction step in data mining which finds the most representative features from the entire data. …"