بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
solved making » mold making (توسيع البحث)
element » elements (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
solved making » mold making (توسيع البحث)
element » elements (توسيع البحث)
-
201
Improved search-tree algorithms for the cluster edit problem. (c2011)
منشور في 2011احصل على النص الكامل
احصل على النص الكامل
masterThesis -
202
A method for optimizing test bus assignment and sizing for system-on-a-chip
منشور في 2017"…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
203
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
204
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
205
An ant colony optimization algorithm to improve software quality prediction models
منشور في 2011"…We use an ant colony optimization algorithm in the adaptation process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
206
Multi-marker-LD based genetic algorithm for tag SNP selection
منشور في 2014"…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
207
Evolutionary algorithms for state justification in sequential automatic test pattern generation
منشور في 2005"…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
احصل على النص الكامل
article -
208
-
209
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
article -
210
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
211
-
212
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
منشور في 2010"…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
213
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
منشور في 2006"…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …"
احصل على النص الكامل
احصل على النص الكامل
article -
214
The buffered work-pool approach for search-tree based optimization algorithms
منشور في 2017"…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
215
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
-
216
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
منشور في 2023"…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …"
-
217
-
218
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …"
احصل على النص الكامل
-
219
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …"
-
220
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …"