يعرض 1 - 20 نتائج من 74 نتيجة بحث عن '(((( dependent processing algorithm ) OR ( elements rl algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 3
  4. 4

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain حسب Al Sadawi, Alia

    منشور في 2021
    "…The objective is to minimize different cost types while satisfying constraints such as resources availability, customer service level, and tasks dependency relation. The algorithm proved its effectiveness by allocating tasks with higher priority and weight while taking into consideration customers’ Service Level Agreement, time, and different types of costs, which led to a lower total cost of the batching process. …"
    احصل على النص الكامل
    article
  5. 5
  6. 6
  7. 7

    Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application حسب Aram Rostami (22045274)

    منشور في 2024
    "…K<sub>med</sub> is calculated for D<sub>m.m</sub> and D<sub>w.w </sub>algorithm types in bone and lung media for both photon beams. …"
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  13. 13
  14. 14

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15
  16. 16

    An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling حسب ALKETBI, SAIF

    منشور في 2016
    "…The proposed algorithm out performed fairly well the results that exists from previous studies. …"
    احصل على النص الكامل
  17. 17

    A kernelization algorithm for d-Hitting Set حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…For a given parameterized problem, π, a kernelization algorithm is a polynomial-time pre-processing procedure that transforms an arbitrary instance of π into an equivalent one whose size depends only on the input parameter(s). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18
  19. 19
  20. 20