يعرض 221 - 230 نتائج من 230 نتيجة بحث عن '(((( element g algorithm ) OR ( complement system algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 221

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases حسب Muhammad Ali Muzammil (17910611)

    منشور في 2024
    "…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …"
  2. 222

    Scrambled Prime Key Encryption حسب Haraty, Ramzi A.

    منشور في 2018
    "…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 223

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS حسب Sait, Sadiq M.

    منشور في 2020
    "…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
    احصل على النص الكامل
    article
  4. 224

    An intelligent EPROM silicon compiler حسب Amin, A.

    منشور في 1991
    "…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 225

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
  6. 226
  7. 227

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 228

    Triage decisions for ICU admission حسب Blanch, Lluis

    منشور في 2016
    "…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 229

    Data redundancy management for leaf-edges in connected environments حسب Mansour, Elio

    منشور في 2022
    "…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 230

    Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper حسب Mutaz I. Othman (21186827)

    منشور في 2025
    "…</p><h3>Methods</h3><p dir="ltr">A discursive approach was used to optimise nurse–patient assignments and the impact of ML models. …"