يعرض 761 - 780 نتائج من 903 نتيجة بحث عن '(((( data using algorithm ) OR ( tests using algorithm ))) OR ( elements per algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 761
  2. 762
  3. 763

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  4. 764

    Low-Cost Reduced Navigation System for Mobile Robot in Indoor/Outdoor Environments حسب Al Khatib, Ehab

    منشور في 2020
    "…For the indoor environment, where GPS signals are blocked, another EKF algorithm is proposed using low cost depth sensor (Microsoft Kinect stream). …"
    احصل على النص الكامل
    article
  5. 765

    Failure recovery in wireless content distribution networks with device-to-device cooperation حسب Sharafeddine, Sanaa

    منشور في 2017
    "…We present results for various network scenarios using simulations and experimental test bed to demonstrate the effectiveness of the proposed algorithms in terms of performance efficiency, computational complexity, and practical implementation feasibility.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 766

    Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy حسب Aram Rostami (22045274)

    منشور في 2026
    "…Treatment plans were created using the Acuros XB algorithm in both Eclipse versions. …"
  7. 767
  8. 768
  9. 769
  10. 770

    On Equivalent Circuit Model-Based State-of-Charge Estimation for Lithium-Ion Batteries in Electric Vehicles حسب Fatma Ahmed (11084787)

    منشور في 2025
    "…A third-order equivalent circuit model is employed for the LIB based on electrochemical impedance spectra test results, with model parameters identified using a particle swarm optimization algorithm. …"
  11. 771

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis حسب Ashraf Gad (17040114)

    منشور في 2024
    "…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…"
  12. 772

    On scalable parallel recursive backtracking حسب Abu-Khzam, Faisal N.

    منشور في 2015
    "…Many of these algorithms use recursive backtracking as their core solution paradigm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 773
  14. 774

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models حسب Raed Ali Mara'Beh (17337892)

    منشور في 2025
    "…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"
  15. 775

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models حسب Raed Ali Ayesh Marabeh (21142247)

    منشور في 2025
    "…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"
  16. 776

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 777

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  18. 778
  19. 779

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  20. 780