Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Ahmed Lehireche"'
Autor:
Sofiane Boukli Hacene, Ahmed Lehireche
Publikováno v:
Computer Science Journal of Moldova, Vol 19, Iss 3(57), Pp 304-319 (2012)
Ad hoc network is a set of nodes that are able to move and can be connected in an arbitrary manner. Each node acts as a router and communicates using a multi-hop wireless links. Nodes within ad hoc networks need efficient dynamic routing protocols to
Externí odkaz:
https://doaj.org/article/ecfcdff078ba407bacd1f6c7d57c2d42
Publikováno v:
Insectes Sociaux. 66:73-80
We present in this article, a new decentralized algorithmic approach for the automatic construction of three-dimensional structure based on simple behavioral rules. This model is an improvement of the model introduced by Eric Bonabeau and Guy Theraul
Publikováno v:
Recent Patents on Computer Science. 10:201-207
The aim of the authors' work is to model the intrusion detection system by scenario with a bio-inspired method in this case the system of protection of social bees. The natural pattern of social bees produces security efficiency by its three filters.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f139f0e048de168eb20522d3d02feef5
https://doi.org/10.4018/978-1-5225-9866-4.ch040
https://doi.org/10.4018/978-1-5225-9866-4.ch040
Publikováno v:
International Journal of Intelligent Systems and Applications. 8:1-9
The most familiar concept in Artificial intelligence is the knowledges representation. It aims to find explicit symbolization covering all semantic aspects of knowledge, and to make possible the use of this representation to produce an intelligent be
Publikováno v:
International Journal of Information Technology and Computer Science. 8:1-13
This work presents a method that enables Arabic NLP community to build scalable lexical resources. The proposed method is low cost and efficient in time in addition to its scalability and extendibility. The latter is reflected in the ability for the
Publikováno v:
International Journal of Information Engineering and Electronic Business. 8:37-47
In this paper we explore two paradigms: firstly, paradigmatic representation via the native HAL model including a model enriched by adding word order information using the permutation technique of Sahlgren and al [21], and secondly the syntagmatic re
Publikováno v:
International Journal of Organizational and Collective Intelligence. 5:44-67
The aim of the authors' work is to model the intrusion detection system by scenario with a bio-inspired method in this case the system of protection of social bees. The natural pattern of social bees produces security efficiency by its three filters.
Autor:
Orkia Derkaoui, Ahmed Lehireche
Publikováno v:
American Journal of Operations Research. :293-300
Efficient solvers for optimization problems are based on linear and semidefinite relaxations that use floating point arithmetic. However, due to the rounding errors, relaxation thus may overestimate, or worst, underestimate the very global optima. Th
Publikováno v:
Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication.
In this paper, we describe a new representative attribute derived from description logics formalism. This attribute constructed using subsumption hierarchy, is very meaningful and can help to perform a simplest form of reasoning Algorithm based on ve