بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
two algorithms » _ algorithms (توسيع البحث)
develop » developed (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
two algorithms » _ algorithms (توسيع البحث)
develop » developed (توسيع البحث)
-
621
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
622
Computation of conformal invariants
منشور في 2021"…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
-
623
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
منشور في 2014"…Then, two types of mode mapping algorithms are proposed. …"
احصل على النص الكامل
article -
624
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …"
-
625
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
-
626
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
منشور في 2023"…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
627
-
628
Cross entropy error function in neural networks
منشور في 2002"…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
629
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …"
-
630
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
منشور في 1997"…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
احصل على النص الكامل
masterThesis -
631
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
632
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
منشور في 2022"…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …"
-
633
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
634
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
منشور في 2017"…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
احصل على النص الكامل
article -
635
On end-to-end scheduling in wireless cellular networks
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
636
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
637
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
منشور في 2024"…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …"
-
638
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
639
-
640
On the complexity of bilinear computations
منشور في 1984"…One problem of interest in arithmetic complexity is the direct sum conjecture due to Strassen. Given two disjoint bilinear problems S(,1) and S(,2), Strassen conjectured that we can optimally compute their direct sum S(,1) (CRPLUS) S(,2) by optimally computing S(,1) and S(,2) separately. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis