بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
would algorithm » mould algorithm (توسيع البحث)
يعرض 521 - 540 نتائج من 719 نتيجة بحث عن '(((( data processing algorithm ) OR ( based method algorithm ))) OR ( elements would algorithm ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 521

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring حسب Muhammad E.H. Chowdhury (17151154)

    منشور في 2019
    "…The hyper parameter optimization, along with and without a feature reduction method, was tested to improve accuracy. The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…"
  2. 522

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing حسب Xin Li (51274)

    منشور في 2020
    "…Finally, we propose a low-complexity heuristic resource allocation algorithm based on this novel theoretical discovery. …"
  3. 523

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 524

    Internal Model Control Structure Using Adaptive Inverse Control Strategy حسب Shafiq, M.Riyaz

    منشور في 2003
    "…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 525

    Second-order conic programming for data envelopment analysis models حسب Mourad, Nahia

    منشور في 2022
    "…Indeed, the aforesaid method is based on mathematical optimization. This paper constructs a second-order conic optimization problem unifying several DEA models. …"
    احصل على النص الكامل
    احصل على النص الكامل
  6. 526
  7. 527

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  8. 528
  9. 529

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology حسب Ajay Vikram Singh (204056)

    منشور في 2023
    "…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …"
  10. 530
  11. 531
  12. 532

    Evolutionary support vector regression for monitoring Poisson profiles حسب Ali Yeganeh (16624998)

    منشور في 2023
    "…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. The new method is quicker in detecting out-of-control signals as compared to conventional statistical methods. …"
  13. 533

    Adaptive Chip-Level Channel Estimation for IMT-DS System: DL and UL حسب SHEIKH, ASRAR

    منشور في 2005
    "…Anovel despreader-respreader based channel estimator has been proposed to obtain uplink channel estimates at chip level which resolves the deficiencies of conventional methods. …"
    احصل على النص الكامل
    article
  14. 534

    Design of a vibration absorber for harmonically forced damped systems حسب Issa, Jimmy

    منشور في 2013
    "…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 535

    Direct sensitivity analysis of nonlinear distortion in RF circuits using multidimensional moments حسب Tannir, Dani

    منشور في 2014
    "…In this paper, we show how the moments method can also be used to perform an efficient and accurate sensitivity analysis through the computation of the expansions of the moment vectors with respect to a circuit parameter, i.e., the multidimensional moments. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 536

    Evacuation of a highly congested urban city حسب El Khoury, John

    منشور في 2017
    "…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 537
  18. 538

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 539

    A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems حسب El Khoury, Elie

    منشور في 2022
    "…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 540

    Improving the security of SNMP in wireless networks حسب Otrok, H.

    منشور في 2017
    "…In this paper, we are addressing (1) the problem of one way authentication that leads to the man-in-the-middle attack and (2) the vulnerability pertaining to the password update method of SNMPv3. We propose to use certification authority for two-way authentication and Diffie-Hellman algorithm for key exchange to mitigate the impacts of these problems.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject