بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
research algorithm » search algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 201 - 220 نتائج من 712 نتيجة بحث عن '(((( data processing algorithm ) OR ( based research algorithm ))) OR ( element method algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 201
  2. 202

    A method for optimizing test bus assignment and sizing for system-on-a-chip حسب Harmanani, Haidar M.

    منشور في 2017
    "…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 203

    An ant colony optimization algorithm to improve software quality prediction models حسب Azar, D.

    منشور في 2011
    "…We use an ant colony optimization algorithm in the adaptation process. The approach is validated on stability of classes in object-oriented software systems and can easily be used for any other software quality characteristic. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 204

    Evolutionary algorithms for state justification in sequential automatic test pattern generation حسب El-Maleh, Aiman H.

    منشور في 2005
    "…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
    احصل على النص الكامل
    article
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210
  11. 211
  12. 212

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  13. 213

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining حسب Alqaryouti, Omar

    منشور في 2021
    "…An integrated web application is developed to mock up the end-to-end process in ecommerce. Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
    احصل على النص الكامل
  14. 214
  15. 215
  16. 216
  17. 217

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic حسب AL MANSOORI, MOUZA

    منشور في 2021
    "…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …"
    احصل على النص الكامل
  18. 218
  19. 219

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
    احصل على النص الكامل
    احصل على النص الكامل
  20. 220

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection حسب HAMDALLAH, KHALID WAJIH TURKI

    منشور في 2011
    "…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
    احصل على النص الكامل