بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
-
501
-
502
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
احصل على النص الكامل
article -
503
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. …"
احصل على النص الكامل
masterThesis -
504
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
505
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
منشور في 2024"…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …"
احصل على النص الكامل
article -
506
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
منشور في 2018"…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
احصل على النص الكامل
-
507
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
احصل على النص الكامل
article -
508
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
احصل على النص الكامل
احصل على النص الكامل
article -
509
Exploring Digital Competitiveness through Bayesian Belief Networks
منشور في 2025"…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
احصل على النص الكامل
article -
510
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
منشور في 2019"…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …"
احصل على النص الكامل
article -
511
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
512
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
513
Online Control and Optimization of Directional Drilling
منشور في 2020"…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…"
احصل على النص الكامل
masterThesis -
514
-
515
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …"
-
516
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …"
-
517
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …"
-
518
-
519
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
520
Neural network-based failure rate prediction for De Havilland Dash-8 tires
منشور في 2006"…Six years of data are used for model building and validation. …"
احصل على النص الكامل
article