بدائل البحث:
research algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
data research » do research (توسيع البحث)
update » updated (توسيع البحث)
research algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
data research » do research (توسيع البحث)
update » updated (توسيع البحث)
-
281
Transmission Line Fault Location Using Unsynchronized Measurements
منشور في 2013احصل على النص الكامل
doctoralThesis -
282
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
منشور في 2006"…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
283
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
منشور في 2019احصل على النص الكامل
doctoralThesis -
284
Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review
منشور في 2023"…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…"
-
285
-
286
-
287
-
288
Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles
منشور في 2023"…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
289
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …"
احصل على النص الكامل
احصل على النص الكامل
article -
290
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. One disadvantage of hardware implementations is their fixed key sizes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
291
-
292
-
293
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
294
-
295
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
منشور في 2019"…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …"
-
296
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
منشور في 2022"…Due to the exploding traffic demands and the diversity of novel applications requiring extensive computation and radio resources, research has been active to devise mechanisms for responding to these challenges. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
297
-
298
-
299
-
300
Dataset built for Arabic Sentiment Analysis
منشور في 2016"…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
احصل على النص الكامل