يعرض 581 - 600 نتائج من 756 نتيجة بحث عن '(((( data using algorithm ) OR ( data processing algorithm ))) OR ( element modeling algorithm ))*', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 581

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 582

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 583
  4. 584

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation حسب Saqr Khalil Saeed Thabet (19517560)

    منشور في 2022
    "…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…"
  5. 585

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 586

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. …"
    احصل على النص الكامل
    article
  7. 587

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 588

    Query acceleration in distributed database systems حسب Haraty, Ramzi A.

    منشور في 2001
    "…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 589

    Three approaches to modelling heating and evaporation of monocomponent droplets حسب Dmitrii V. Antonov (21225041)

    منشور في 2024
    "…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
  10. 590
  11. 591

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 592

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations حسب Gutub, Adnan

    منشور في 2007
    "…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 593

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants حسب Khan, T.

    منشور في 2006
    "…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 594

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 595
  16. 596

    Design and development of an embedded controller for roboticmanipulator حسب Bakhashwain, J.M.

    منشور في 1998
    "…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 597

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 598

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  19. 599
  20. 600

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
    احصل على النص الكامل
    article