-
1
Towards a Unified Arabic Government Services Chatbot Based on Ontology
منشور في 2020"…As far as Dubai government is concerned, some entities have taken a step forward by introducing their own chatbot technology to respond to customer inquiries. However, the challenges fraught with the chatbot development in general in addition to the challenges associated with the Arabic language in particular, made it extremely difficult to design a unified chatbot that is capable to respond to all services provided by Dubai government especially when dealing with the Arabic language. …"
احصل على النص الكامل
-
2
Formal synthesis of VLSI layouts from algorithmic specifications
منشور في 2020"…These algorithms can be mathematically verified for correctness before begin subjected to the task of translation. …"
احصل على النص الكامل
article -
3
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…<p dir="ltr">The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications. …"
-
4
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
منشور في 2013"…It is also tested for the case when more information, beyond nearest neighbors, is made available; here, we test its operation for different numbers of step look-ahead. We verify algorithm performance by means of simulations, whereby navigational paths are calculated for different radiation fields.…"
احصل على النص الكامل
article -
5
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
6
حوكمة الذكاء الاصطناعي ضمن أحكام القانون الدولي لحقوق الإنسان
منشور في 2022احصل على النص الكامل
article -
7
Leveraging UAVs for Coverage in Cell-Free Vehicular Networks
منشور في 2020"…The success in transitioning towards smart cities relies on the availability of information and communication technologies that meet the demands of this transformation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
Multi-Agent Variational Approach for Robotics: A Bio-Inspired Perspective
منشور في 2023"…This study proposes an adaptable, bio-inspired optimization algorithm for Multi-Agent Space Exploration. The recommended approach combines a parameterized Aquila Optimizer, a bio-inspired technology, with deterministic Multi-Agent Exploration. …"
احصل على النص الكامل
-
9
Enhancement of blocking performance in all-optical WDM networks. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
10
Automatic keyword extraction from a real estate classifieds data set
منشور في 2011"…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …"
احصل على النص الكامل
-
11
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
منشور في 2017احصل على النص الكامل
doctoralThesis -
12
AUS-UAV HILS Setup of Dynamic Flight Path Planning
منشور في 2006احصل على النص الكامل
doctoralThesis -
13
-
14
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
منشور في 2022"…On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …"
-
15
-
16
-
17
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
منشور في 2021"…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …"
-
18
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
19
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
20
Accelerating Blockchain Transaction Verification With Parallel Computing
منشور في 2024احصل على النص الكامل
doctoralThesis