يعرض 541 - 560 نتائج من 747 نتيجة بحث عن '(((( data processing algorithm ) OR ( data using algorithm ))) OR ( element method algorithm ))', وقت الاستعلام: 0.19s تنقيح النتائج
  1. 541

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration حسب Al-Yamani, A.

    منشور في 0000
    "…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 542

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant حسب ALMutawa, J.

    منشور في 2007
    "…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 543
  4. 544

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) حسب Stamboulian, Mouses Hrag

    منشور في 2015
    "…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 545

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  6. 546

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization حسب Majdi Mansouri (16869885)

    منشور في 2022
    "…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
  7. 547

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  8. 548

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem حسب Habchi, Wassim

    منشور في 2008
    "…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 549
  10. 550

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  11. 551

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
    احصل على النص الكامل
  12. 552

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 553

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …"
  14. 554

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  15. 555

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 556

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  17. 557

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
  18. 558

    Starvation Problem in CPU Scheduling for Multimedia Systems حسب Salah, Khaled

    منشور في 2002
    "…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
    احصل على النص الكامل
    article
  19. 559

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  20. 560

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article