يعرض 41 - 60 نتائج من 184 نتيجة بحث عن '(((( defect detection algorithm ) OR ( element method algorithm ))) OR ( data finding algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 41

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements حسب Stefano Nardean (14151900)

    منشور في 2023
    "…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …"
  2. 42
  3. 43
  4. 44

    Indexing Arabic texts using association rule data mining حسب Haraty, Ramzi A.

    منشور في 2019
    "…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 45

    A fast exact sequential algorithm for the partial digest problem حسب Mostafa M. Abbas (17058093)

    منشور في 2016
    "…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
  6. 46

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  7. 47
  8. 48

    A method for optimizing test bus assignment and sizing for system-on-a-chip حسب Harmanani, Haidar M.

    منشور في 2017
    "…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 49

    Assessment of static pile design methods and non-linear analysis of pile driving حسب Abou-Jaoude, Grace G.

    منشور في 2006
    "…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 50

    Evolutionary algorithms for state justification in sequential automatic test pattern generation حسب El-Maleh, Aiman H.

    منشور في 2005
    "…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
    احصل على النص الكامل
    article
  11. 51
  12. 52

    The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs حسب Muhammad Kashif (3923483)

    منشور في 2023
    "…One of the prominent challenges lies in the presence of barren plateaus (BP) in QML algorithms, particularly in quantum neural networks (QNNs). …"
  13. 53

    A data envelopment analysis model for opinion leaders’ identification in social networks حسب Hamed Baziyad (19273738)

    منشور في 2024
    "…The graph-based methods are one of the most important approaches for finding OLs in OSNs. Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
  14. 54

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices حسب Samir, Moataz

    منشور في 2019
    "…To solve it, we first propose the high-complexity branch, reduce and bound (BRB) algorithm to find the global optimal solution for relatively small scale scenarios. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 55

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
    احصل على النص الكامل
    احصل على النص الكامل
  16. 56

    Automatic keyword extraction from a real estate classifieds data set حسب Devassy, Dibin

    منشور في 2011
    "…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …"
    احصل على النص الكامل
  17. 57

    BioNetApp: An interactive visual data analysis platform for molecular expressions حسب Ali M. Roumani (18615124)

    منشور في 2019
    "…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…"
  18. 58
  19. 59
  20. 60