بدائل البحث:
research algorithm » search algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
research algorithm » search algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
581
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
احصل على النص الكامل
احصل على النص الكامل
article -
582
Exploring Digital Competitiveness through Bayesian Belief Networks
منشور في 2025"…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
احصل على النص الكامل
article -
583
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
منشور في 2019"…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …"
احصل على النص الكامل
article -
584
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
585
Indoor Localization Based on Floor Plans and Power Maps
منشور في 2015احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
586
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
587
Online Control and Optimization of Directional Drilling
منشور في 2020"…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…"
احصل على النص الكامل
masterThesis -
588
-
589
-
590
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …"
-
591
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
592
Turbo-charging dominating set with an FPT subroutine
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
593
Neural network-based failure rate prediction for De Havilland Dash-8 tires
منشور في 2006"…Six years of data are used for model building and validation. …"
احصل على النص الكامل
article -
594
-
595
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
596
Local convexity preserving rational cubic spline curves
منشور في 1997"…An algorithm is presented which constructs a curve by interpolating the given data points. …"
احصل على النص الكامل
احصل على النص الكامل
article -
597
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
منشور في 2013"…We use this algorithm to build a sensor selection model to choose among location sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
598
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
599
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
600
RRT and Octomap based 3D environment exploration and mapping
منشور في 2020احصل على النص الكامل
doctoralThesis