بدائل البحث:
mining algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
agent » agents (توسيع البحث)
يعرض 521 - 540 نتائج من 710 نتيجة بحث عن '(((( data using algorithm ) OR ( data mining algorithm ))) OR ( agent based algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 521

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants حسب Khan, T.

    منشور في 2006
    "…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 522

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 523

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles حسب Wadi, Ali

    منشور في 2017
    "…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
    احصل على النص الكامل
    article
  4. 524
  5. 525

    Design and development of an embedded controller for roboticmanipulator حسب Bakhashwain, J.M.

    منشور في 1998
    "…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 526

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 527

    A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making حسب Sachin Jain (19161721)

    منشور في 2024
    "…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …"
  8. 528

    Investigation of Forming a Framework to shortlist contractors in the tendering phase حسب DABASH, MOHANNAD SALAH

    منشور في 2022
    "…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
    احصل على النص الكامل
  9. 529
  10. 530

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature حسب Saif, Badran

    منشور في 2022
    "…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. ResultsThe ischemic sequelae of envenomation typically evolves over a few days. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 531

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
    احصل على النص الكامل
    article
  12. 532

    A Hardware Model of an Expandable RSA Cryptogrsphic System حسب Gutub, Adnan

    منشور في 1998
    "…Data security is an important aspect of information transmission and storage in an electronic form. …"
    احصل على النص الكامل
    masterThesis
  13. 533

    A microscale evaluation of pavement roughness effects for asset management حسب El Khoury, John

    منشور في 2013
    "…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 534

    Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine حسب Shomope, Ibrahim

    منشور في 2024
    "…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …"
    احصل على النص الكامل
    article
  15. 535

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services حسب ALBARGHOTHI, ALI BAHA’EDDIN

    منشور في 2018
    "…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
    احصل على النص الكامل
  16. 536

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
    احصل على النص الكامل
    article
  17. 537

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip حسب El-Maleh, A.

    منشور في 2001
    "…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 538

    Exploring Digital Competitiveness through Bayesian Belief Networks حسب Qazi, Abroon

    منشور في 2025
    "…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
    احصل على النص الكامل
    article
  19. 539

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …"
    احصل على النص الكامل
    article
  20. 540

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
    احصل على النص الكامل
    احصل على النص الكامل
    article