بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
under algorithm » deer algorithm (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
under algorithm » deer algorithm (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
-
1
-
2
On the Optimization of Band Gaps in Periodic Waveguides
منشور في 2025"…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …"
-
3
-
4
-
5
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
6
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
منشور في 2016"…Then, it searches for population discriminative motifs or differentiable sequence of SNPs, by implementing Probabilistic Suffix Trees data structures. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
7
-
8
Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives
منشور في 2005"…The proposed GFLC is developed to have less computational burden, which makes it suitable for real-time implementation. The parameters for the GFLC are tuned by genetic algorithm (GA). …"
احصل على النص الكامل
article -
9
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
منشور في 2002"…We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
10
-
11
Image-Based Air Quality Estimation Using Convolutional Neural Network Optimized by Genetic Algorithms: A Multi-Dataset Approach
منشور في 2025"…<p dir="ltr">Air pollution poses significant threats to human health and the environment, making effective monitoring increasingly essential. …"
-
12
-
13
Boosting the visibility of services in microservice architecture
منشور في 2023"…Our research also analyzed the boosting algorithms, namely Gradient Boost, XGBoost, LightGBM, and CatBoost to improve the overall performance. …"
-
14
-
15
-
16
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
17
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
منشور في 2014"…GFT (Genetic Fuzzimetric Technique) is of no exception which merges Fuzzy logic with genetic algorithm to achieve the optimization of the decision making process under uncertainty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
18
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
19
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"