يعرض 221 - 229 نتائج من 229 نتيجة بحث عن '(((( complement past algorithm ) OR ( element data algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.17s تنقيح النتائج
  1. 221

    Scrambled Prime Key Encryption حسب Haraty, Ramzi A.

    منشور في 2018
    "…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 222

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS حسب Sait, Sadiq M.

    منشور في 2020
    "…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
    احصل على النص الكامل
    article
  3. 223

    An intelligent EPROM silicon compiler حسب Amin, A.

    منشور في 1991
    "…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 224

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
  5. 225
  6. 226

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 227

    Triage decisions for ICU admission حسب Blanch, Lluis

    منشور في 2016
    "…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 228

    Data redundancy management for leaf-edges in connected environments حسب Mansour, Elio

    منشور في 2022
    "…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 229

    Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper حسب Mutaz I. Othman (21186827)

    منشور في 2025
    "…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …"