بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
most making » mold making (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
most making » mold making (توسيع البحث)
element » elements (توسيع البحث)
-
261
Evacuation of a highly congested urban city
منشور في 2017"…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
262
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
منشور في 2014احصل على النص الكامل
doctoralThesis -
263
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …"
احصل على النص الكامل
-
264
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
265
The monotone circuit value problem with bounded genus is in NC
منشور في 2017"…In addition to extending this result from genus 1 to any bounded genus k, and unlike the work reported by Limaye et al., we do not require a precomputed embedding to be given. Most importantly, our results imply that given a P-complete problem, it is possible to find an algorithm that makes the problem fall into NC by fixing one or more parameters. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
266
-
267
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
268
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…Results show that, in most cases, our proposed technique out-performs the others in different aspects.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
269
High-order parametrization of the hypergeometric-Meijer approximants
منشور في 2023"…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …"
-
270
Computed tomography-detected hemothorax after blunt chest trauma: Does everyone need an intervention? A retrospective analysis
منشور في 2025"…Quantitative assessment of hemothorax volume should be considered part of the clinical decision-making algorithm. Further research is needed to refine management strategies and improve outcomes for traumatic hemothorax.…"
-
271
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
منشور في 2021احصل على النص الكامل
doctoralThesis -
272
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
منشور في 2015احصل على النص الكامل
doctoralThesis -
273
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
274
-
275
From Collatz Conjecture to chaos and hash function
منشور في 2023"…This paper aims to introduce a novel approach to addressing current security challenges by utilizing our generalized Collatz process to create a chaos-based hash function. By leveraging the unpredictable behaviour of the Collatz sequence, the proposed hash function aims to enhance ergodicity and entropy properties, thereby making it well-suited for cryptographic applications. …"
-
276
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
277
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …"
-
278
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
279
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
منشور في 2022"…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
-
280
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article