يعرض 1 - 20 نتائج من 98 نتيجة بحث عن '(((( implement detection algorithm ) OR ( elements new algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.17s تنقيح النتائج
  1. 1

    A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates حسب Andrianarison, O.

    منشور في 2024
    "…A new Hamiltonian semi-analytical method is established to investigate the free vibration characteristics of piezoelectric multilayered plates. …"
    احصل على النص الكامل
    article
  2. 2
  3. 3

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
    احصل على النص الكامل
  4. 4
  5. 5

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  6. 6
  7. 7

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …"
  8. 8

    Adaptive bias simulated evolution algorithm for placement حسب Youssef, H.

    منشور في 2001
    "…Simulated Evolution (SE) is a general meta-heuristic for combinatorial optimization problems. A new solution is evolved from current solution by relocating some of the solution elements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 10
  11. 11
  12. 12
  13. 13

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
    احصل على النص الكامل
    article
  14. 14

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  16. 16

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…"
  17. 17

    Evolutionary algorithms for state justification in sequential automatic test pattern generation حسب El-Maleh, Aiman H.

    منشور في 2005
    "…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both to reduce execution time and improve fault coverage. …"
    احصل على النص الكامل
    article
  18. 18

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem حسب Abu Zitar, Raed

    منشور في 2023
    "…On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …"
    احصل على النص الكامل
  19. 19

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"