بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
-
141
Artificial intelligence models for predicting the mode of delivery in maternal care
منشور في 2025"…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …"
-
142
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
منشور في 2020"…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
احصل على النص الكامل
article -
143
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
منشور في 2023احصل على النص الكامل
doctoralThesis -
144
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
منشور في 2009احصل على النص الكامل
doctoralThesis -
145
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …"
احصل على النص الكامل
article -
146
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
147
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
148
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
149
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
150
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
151
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
-
152
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
منشور في 2023"…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …"
-
153
-
154
An intelligent EPROM silicon compiler
منشور في 1991"…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…"
احصل على النص الكامل
احصل على النص الكامل
article -
155
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
156
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
157
Software defect prediction. (c2019)
منشور في 2019"…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
158
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
159
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. With the advent of fog computing, personal mobile devices in a given geographical area may also comprise a very dynamic distributed storage system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
160
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article