يعرض 461 - 480 نتائج من 686 نتيجة بحث عن '(((( complement component algorithm ) OR ( elementi per algorithm ))) OR ( data using algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 461

    The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control حسب Yasen Harrye (22415632)

    منشور في 2023
    "…Power equations, range of power transferred and zero-voltage switching (ZVS) are derived for all the modes under TPS without assuming fundamental component analysis. Additionally, a generic optimization algorithm is developed to show the advantages of TPS modulation, and thus, the analysis in this paper offers a valuable insight for single-phase DAB converter designers in identifying a wide range of optimization algorithms to achieve higher efficiency under TPS modulation. …"
  2. 462

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK حسب Al-Garni, Ahmed Z.

    منشور في 2007
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  3. 463

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …"
    احصل على النص الكامل
  4. 464

    Competitive learning/reflected residual vector quantization for coding angiogram images حسب Mourn, W.A.H.

    منشور في 2003
    "…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 465

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
  6. 466

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 467

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework حسب Tayyabah Hasan (18427887)

    منشور في 2022
    "…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …"
  8. 468

    Scatter search for homology modeling حسب Mansour, Nashat

    منشور في 2016
    "…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 469

    Video features with impact on user quality of experience حسب Abbas, Nadine

    منشور في 2021
    "…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 470

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 471

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
  12. 472
  13. 473

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
  14. 474
  15. 475

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation حسب Saqr Khalil Saeed Thabet (19517560)

    منشور في 2022
    "…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…"
  16. 476
  17. 477

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 478

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 479

    Query acceleration in distributed database systems حسب Haraty, Ramzi A.

    منشور في 2001
    "…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 480

    Three approaches to modelling heating and evaporation of monocomponent droplets حسب Dmitrii V. Antonov (21225041)

    منشور في 2024
    "…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"