بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
61
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …"
احصل على النص الكامل
احصل على النص الكامل
article -
62
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …"
احصل على النص الكامل
-
63
A novel few shot learning derived architecture for long-term HbA1c prediction
منشور في 2024"…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…"
-
64
FPGA-Based Network Traffic Classification Using Machine Learning
منشور في 2019احصل على النص الكامل
doctoralThesis -
65
A new fuzzy logic controller based IPM synchronous motor drive
منشور في 2003"…The proposed FLC is designed to have less computational burden, which makes it suitable for online implementation. The FLC parameters are optimized by genetic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
66
On the exact recovery of the FFT of noisy signals using a non-subtractively dither-quantized input channel
منشور في 2003"…This theory, tested with a 1-bit quantization scheme and under very noisy environments is very well supported by our simulation results. This makes the possibility of a hardware implementation of a 1-bit FFT chip a goal worth pursuing.…"
احصل على النص الكامل
احصل على النص الكامل
article -
67
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
منشور في 2007"…A prototype has been implemented to evaluate the performance of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
68
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
69
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
70
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
71
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
منشور في 2015"…This paper also discusses the cognitive radio implementation and the learning challenges foreseen in cognitive radio applications.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
72
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
73
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
74
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
75
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
76
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
77
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
78
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
79
After generative AI : preparing faculty to transform education, learning, and pedagogy
منشور في 2025"…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
bookPart -
80