بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
301
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
302
-
303
Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy
منشور في 2026"…Treatment plans were created using the Acuros XB algorithm in both Eclipse versions. …"
-
304
Stability and Numerical Solutions of Second Wave Mathematical Modeling on COVID-19 and Omicron Outbreak Strategy of Pandemic: Analytical and Error Analysis of Approximate Series So...
منشور في 2022"…The algorithm guidelines are used for international arrivals, with Omicron variant cases updated by the Union Health Ministry in January 2022. …"
-
305
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
منشور في 2022"…Later, a nine-antenna array-based microwave brain imaging (MBI) system is implemented and investigated by using phantom model. After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …"
-
306
-
307
Scheduling IoT Requests to Minimize Latency in Fog Computing
منشور في 2017احصل على النص الكامل
doctoralThesis -
308
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
منشور في 2021"…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
احصل على النص الكامل
article -
309
-
310
-
311
-
312
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
313
Optimizing Energy Consumption of Cloud Computing IaaS
منشور في 2017احصل على النص الكامل
doctoralThesis -
314
-
315
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
316
Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis
منشور في 2021"…This work leverages the output of wearable technology to provide automatic stress and stressor identification model. In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …"
-
317
Modeling of magnetization curves for computer-aided design
منشور في 1993"…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …"
احصل على النص الكامل
احصل على النص الكامل
article -
318
-
319
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…This implementation is modeled using VHDL in a parametrizable manner. Two other parameterized RSA hardware designs have also been VHDL modeled for comparison. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
320
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
منشور في 2017احصل على النص الكامل
doctoralThesis