بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 501 - 520 نتائج من 750 نتيجة بحث عن '(((( data using algorithm ) OR ( text processing algorithm ))) OR ( elements method algorithm ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 501

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  2. 502

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 503

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  4. 504

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 0000
    "…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 505

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 506

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) حسب Elaine Beller (44602)

    منشور في 2018
    "…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
  7. 507
  8. 508

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
  9. 509

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 510

    Starvation Problem in CPU Scheduling for Multimedia Systems حسب Salah, Khaled

    منشور في 2002
    "…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
    احصل على النص الكامل
    article
  11. 511

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  12. 512

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES حسب Al-Garni, Ahmed Z.

    منشور في 2020
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  13. 513

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
  14. 514
  15. 515
  16. 516
  17. 517

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2015
    "…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 518

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK حسب Al-Garni, Ahmed Z.

    منشور في 2007
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  19. 519

    Competitive learning/reflected residual vector quantization for coding angiogram images حسب Mourn, W.A.H.

    منشور في 2003
    "…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 520

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"