بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
element » elements (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
element » elements (توسيع البحث)
-
41
Test time minimization for system-on-chip with test bus assignment and sizin
منشور في 2017"…Test access mechanism (TAM) is responsible for test data transport and is characterized by its bandwidth capacity. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
42
-
43
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
منشور في 2020"…In this research, different machine-learning algorithms such as logistic regression, random forest and naïve Bayes were tuned and tested. …"
-
44
Matheuristic Fixed Set Search Applied to the Two-Stage Capacitated Facility Location Problem
منشور في 2025الموضوعات: -
45
Starvation Problem in CPU Scheduling for Multimedia Systems
منشور في 2002"…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …"
احصل على النص الكامل
article -
46
Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization
منشور في 2022"…The IGOA was compared with several other proposed meta-heuristic algorithms. Moreover, the Wilcoxon signed-rank test further assessed the experimental results to conduct more systematic data analyses. …"
احصل على النص الكامل
-
47
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
48
Regression Testing of Database Applications
منشور في 2002"…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
49
-
50
-
51
-
52
Virtualizing and Scheduling FPGA Resources in Cloud Computing Datacenters
منشور في 2021احصل على النص الكامل
doctoralThesis -
53
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
54
Reinforcement R-learning model for time scheduling of on-demand fog placement
منشور في 2020"…Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
55
-
56
An Infrastructure-Assisted Workload Scheduling for Computational Resources Exploitation in the Fog-Enabled Vehicular Network
منشور في 2020"…This article proposes an infrastructure-assisted task scheduling scheme where the roadside unit receives computational tasks from different sources and schedules these tasks over a computationally capable vehicle residing within the roadside unit’s range. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
57
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
58
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
-
59
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
60
Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration
منشور في 0000"…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …"
احصل على النص الكامل
احصل على النص الكامل
article