بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
past algorithm » jaya algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
past algorithm » jaya algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
element » elements (توسيع البحث)
-
221
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
222
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
منشور في 2020"…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
احصل على النص الكامل
article -
223
An intelligent EPROM silicon compiler
منشور في 1991"…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…"
احصل على النص الكامل
احصل على النص الكامل
article -
224
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
-
225
Towards Multimedia Fragmentation
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
226
Data Redundancy Management in Connected Environments
منشور في 2020"…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
227
Triage decisions for ICU admission
منشور في 2016"…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
228
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
229
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
منشور في 2025"…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …"