يعرض 141 - 160 نتائج من 169 نتيجة بحث عن '(((( element based algorithm ) OR ( experiments showed algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 141

    Central schemes for ideal magnetohydrodynamics حسب Touma, Rony

    منشور في 2007
    "…The div·B = 0 constraint on the magnetic field is enforced with a suitable adaptation of the constrained transport method to our central schemes. Numerical experiments show the feasibility of the proposed methods and our results are in good agreement with existing results in the recent literature. (© 2008 WILEY‐VCH Verlag GmbH & Co. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 142

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…Finally, a maintenance environment for database applications is described. Our experience with this regression testing methodology shows that the impact analysis technique is adequate for selecting regression tests and that phase 2 techniques can be used for further reduction in the number of theses tests.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 143
  4. 144

    A hybrid Harris Hawks optimizer for economic load dispatch problems حسب Al-Betar, Mohammed Azmi

    منشور في 2022
    "…The results show that the proposed algorithm can achieve a significant performance for the majority of the experimented cases. …"
    احصل على النص الكامل
  5. 145

    Finite volume central schemes for three-dimensional ideal MHD حسب Touma, R.

    منشور في 2008
    "…The div.B = 0 constraint on the magnetic field is enforced with a suitable adaptation of the constrained transport method to our central schemes. Numerical experiments show the feasibility of these methods and our results are in good agreement with existing results in the literature.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 146
  7. 147

    UML-based regression testing for OO software حسب Mansour, Nashat

    منشور في 2010
    "…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 148

    Depthwise Separable Convolutions and Variational Dropout within the context of YOLOv3 حسب Chakar, Joseph

    منشور في 2020
    "…We also explore variational dropout: a technique that finds individual and unbounded dropout rates for each neural network weight. Experiments on the PASCAL VOC benchmark dataset show promising results where variational dropout combined with the most efficient YOLOv3 variant lead to an extremely sparse solution that reduces 95% of the baseline network’s parameters at a relatively small drop of 3% in accuracy.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 149

    Internal Model Control Structure Using Adaptive Inverse Control Strategy حسب Shafiq, M.Riyaz

    منشور في 2003
    "…Computer simulation results and the outcomes of real-time experiment are included in the paper to show the effectiveness of the proposed method.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 155

    Cooperative Caching Policy in Fog Computing for Connected Vehicles حسب Ghazleh, Ali

    منشور في 2023
    "…Furthermore, the results showed the proposed model's effectiveness compared to traditional algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 156

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  17. 157

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 158

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review حسب Alaa Abd-alrazaq (17058018)

    منشور في 2022
    "…PCs were the most common platform used to play serious games. The most common algorithm used in the included studies was support vector machine. …"
  19. 159

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…The proposed approach evaluated better accuracy, precision, recall, and f1 scores than the other algorithms. Furthermore, the results were relatively assessed, which showed LDSVM performance. …"
  20. 160

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article