يعرض 141 - 160 نتائج من 303 نتيجة بحث عن '(((( data code algorithm ) OR ( data tracking algorithm ))) OR ( present study algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 141

    Inception voltage of corona in bipolar ionized fields-effect oncorona power loss حسب Al-Hamouz, Z.

    منشور في 1996
    "…In addition, the effect of ion penetration on reducing the positive conductor corona inception voltage is also studied. The present algorithm is applied to different laboratory and full scale transmission line configurations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 142

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 0000
    "…In this paper, we propose an expectation-maximization algorithm for joint channel and data recovery in fast fading environments. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 143

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
  4. 144

    Charge and reduce حسب Abu-Khzam, Faisal N.

    منشور في 2015
    "…We prove that String-to-String Correction is fixed-parameter tractable, for parameter k, and present a simple fixed-parameter algorithm that solves the problem in O(2kn) time. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 145

    On the parameterized parallel complexity and the vertex cover problem حسب Abu-Khzam, Faisal N.

    منشور في 2016
    "…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 146

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism حسب Aisha Nasser J. M. Al-Saei (17885957)

    منشور في 2023
    "…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …"
  7. 147

    On Single Source Reachability Improvement حسب Alkak, Hashem

    منشور في 2022
    "…We show the NP­ hardness and present an effective polynomial-time greedy algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  8. 148
  9. 149

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …"
  10. 150

    An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications حسب Ouaiss, I.

    منشور في 2017
    "…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 151

    A Blockchain Model for Secure Communications in Internet of Vehicles حسب Mershad, Khaleel

    منشور في 2021
    "…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 152

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  13. 153
  14. 154
  15. 155
  16. 156
  17. 157

    A microscale evaluation of pavement roughness effects for asset management حسب El Khoury, John

    منشور في 2013
    "…A new low-cost and efficient technology is presented to measure and contrast vehicles' vertical accelerations over smooth and rough pavement sections. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 158

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) حسب Elaine Beller (44602)

    منشور في 2018
    "…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
  19. 159

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining حسب Koen Schaaf (14778139)

    منشور في 2021
    "…However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. …"
  20. 160