بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element based » event based (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element based » event based (توسيع البحث)
-
641
Innovative mobile E-healthcare systems
منشور في 2016"…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
642
-
643
Humanizing AI in medical training: ethical framework for responsible design
منشور في 2023"…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …"
-
644
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
منشور في 2024"…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"
-
645
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
646
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…"
-
647
Regression Testing of Database Applications
منشور في 2002"…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
648
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
649
Query acceleration in distributed database systems
منشور في 2001"…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
650
-
651
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
منشور في 1997"…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
احصل على النص الكامل
masterThesis -
652
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
653
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
654
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
655
Cooperative Caching Policy in Fog Computing for Connected Vehicles
منشور في 2023"…Furthermore, the results showed the proposed model's effectiveness compared to traditional algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
656
On end-to-end scheduling in wireless cellular networks
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
657
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…</p> <h2>Conclusion</h2> <p> Genetic algorithms can be used along with finite element analysis and zigzag cutouts to tune the band gap of plates subjected to base-excitations. …"
-
658
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
احصل على النص الكامل
احصل على النص الكامل
article -
659
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…"
-
660