Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
28 result(s) for "الخوارزمي (لغة برمجة)"
Sort by:
Proposed Method for Robot Path Planning Using Q - Learning algorithm
This paper talks about the use of one of the artificial intelligence with Q- learning algorithm application which works to find the shortest way to achieve the target from the exact point within the matrix array with high accuracy which is not depending on working withindeadline so we mix it with neural network algorithm to make a pre represented version as a technical and software-supported version therefor we will produce number of a typical, very effective robotics in short time which guarantee programming the pure version with logical and touchable results to ensure the success of the experiment and its results which will talk about within the bellow figure. There are five types of working methods of robotic; we will talk about one of them which are Q-learning in details. When the application of robotics algorithms from robotic process methods we can choose one and using Q-learning method to reach the target with a short distance and time, using VB .net language and mat lab programs for using the neural network methods to choose the best robotic design and program from reference model to create a model and watching the goal in the best time.
تراكيب البيانات والخوارزميات بلغة جافا
تراكيب البيانات والخوارزميات بلغة جافا تأليف الأستاذ الدكتور علاء حسين الحمامي، صدر الكتاب عن دار وائل للنشر بعمان بالأردن، وتضمن الكتاب 518 صفحة من القطع المتوسط، يعرض هذا الكتاب مبادئ أساسية عن تركيب البيانات، ومقدمة إلى لغة جافا، وأوامر لغة جافا، والمصفوفة، والخوارزميات، والمكدس، والطابور والقوائم، والأشجار، وأشجار البحث، والاستدعاء الذاتي، والفرز، والمخططات، وأخيرا الهياكل الموصولة.
Proposed Algorithm to generate encryption Key for Block and Stream Cipher Using DNA Computing
Deoxyribonucleic (DNA) cryptography is taken from biological science. DNA has the ability to carry a lot of information and transform it among generations. DNA provide secure communications between authentic parties cause of huge similarity and addition amount of information that DNA molecule can transform .The aim of the research is to deal with all symmetric encryption key algorithms (block and stream) regardless of the encryption algorithm to produce high randomness, and different lengths such that it is suitable for any algorithm required by encryption agency.
الخوارزميات وتحليل النظم : الخطوات الأولى في البرمجة = Algorithms and systems analysis : first steps in programming
علوم الحاسوب هي علوم العصر ومن يتقن البرمجة تتوفر أمامه فرص كبيرة للعمل المشكلة أن تعلم الحاسوب في بلادنا يركز على تعليم لغات البرمجة مع المرور السريع إلى مخططات انسيابية وكود زائف ثم كتابة البرنامج هذا الكتاب مخصص لهذا الغرض حيث يآخذ القارئ خطوة بخطوة ابتداء من المشكلة وحتى كتابة البرنامج.
Efficient Image Enhancement Techniques Based on modified mean Filter and K-SVD Algorithm
All digital images contain some degree of noise. Image enhancement algorithm attempts to remove this noise from the image. Ideally, the resulting de noised image will not contain any noise or added artifacts. Denoising of natural images corrupted by Gaussian noise using Wavelet transformation techniques is very effective because of its ability to capture the energy of a signal in few energy transform values. In this paper, mean pixel energy for each windows of noisy image will calculate by using the Energy Estimation operation then store in a dictionary. Noisy image decomposed using Wavelet transform and then applied K-SVD algorithm noise removal. In the same time, the modified mean filter is also applied to the de-noised image for noise removal. Finally, the de-noised image get from the comparison between (modified mean with K-SVD algorithm) outputs and select the appropriate pixels depend on the energy value stored on the dictionary.
تركيب البيانات وتصميم الخوارزميات
يتناول الكتاب موضوع البيانات التي على درجة بالغة الأهمية في علم الحاسوب، حيث أنه يناقش الطرق المختلفة لتنظيم البيانات لعدة أسباب منها أن اختيار الطريقة المناسبة لتمثيل البيانات يؤدي إلى استخدام خوارزمات حل أكثر كفاءة (من حيث وقت التنفيذ وحجم ذاكرة الحاسوب المستخدمة، ومن هنا يكون الترابط بين موضوع تراكيب البيانات وتحليل الخوارزميات(المعرفة وقت التنفيذ وحجم ذاكرة الحاسوب اللازمين)
Proposed Secret Encoding Method Based Genetic Algorithm for Elliptic Curve Cryptography Method
There are a lot of internet applications that requires data to be transmitted in a more secure way. Cryptography assists in providing data security. Elliptic Curve Cryptography is one of the cryptographic methods that provide security to the secret messages. ECC based on static encoding matrix in order to convert the secret message to points before making the encryption. In this paper a proposed random and more secure encoding method is presented in order to improve ECC encoding security. In the proposed method the Genetic algorithm is utilized in order to provide the randomness feature to the based predefined matrix. The genetic algorithm information will be published as public key with ECC public keys in order to give the ability to the receiver to utilize the same matrix at the sender side. ECC has good security and based with the proposed encoding method the security is increased since even if the attacker get the information of the genetic algorithm or the static matrix he/she can't know the based matrix in encoding process. The total time of the proposed encoding method with the ECC method is the sum of the generated encoding matrix time and ECC time.
الذكاء الاصطناعي = Artificial intelligence : تطبيقات وخوارزميات في تعلم الآلة والتعلم العميق والبرمجة بلغة باثيون
علوم الذكاء الاصطناعي هي علوم العصر وصارت أكبر مصدر للقوة والثراء، ودخلت هذه العلوم في كثير من الجامعات. هذا الكتاب لطالب الجامعة، وصاحب الشركة، وهو يشرح أهم تطبيقات الذكاء الاصطناعي وخاصة في مجالي تعلم الآلة والتعلم العميق، كما يقدم الكثير من خوارزميات الذكاء الاصطناعي بلغة بايثون. ويمكن أن يستفيد منه طالب الثانوي الذي يريد أن يدرس أحد هذه العلوم ليعرف فروع هذا العلم ويحدد مجال تخصصه، وما هي لغات البرمجة التي يجب أن يتقنها.
MSOM: Modified Self Organizing Map for Faster Winning Cluster Detection
There are large number of modern techniques in today's world which is evolving for collecting big data at different databases. Organized information investigation techniques are important to pick up/concentrate valuable data from quickly developing datasets. K-means Clustering investigation strategy is one of the generally utilized expository strategies as a part of numerous information mining applications. This paper including two stages in dealing with large and big datasets, the first stage discusses two clustering algorithms Self Organizing Map (SOM) and k-means about Performance Evaluation of K-Means and SOM Clustering. Using (C# and Matlab) programming language and the performance for k-means and SOM clustering algorithm is calculate based on the accuracy and running time. The second stage proposed modified self-organizing map(MSOM)to select winner cluster and extract this cluster from rapidly growing datasets which contain a hundred or more clusters in a very little time. This modification will appeared in two places in SOM standard algorithm. Evaluation results and conclusion will discuss in the last section. The purpose of the proposed Modified Self Organizing Map (MSOM) is to facilitate the search and access to the class that contains the desired product in the case of high number of classes where the proposed method to finding the best Class containing the desired product.