يعرض 181 - 200 نتائج من 295 نتيجة بحث عن '(((( implement based algorithm ) OR ( element data algorithm ))) OR ( level coding algorithm ))*', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 181

    A method for data path synthesis using neural networks حسب Harmanani, H.

    منشور في 2017
    "…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 182

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …"
    احصل على النص الكامل
    article
  3. 183

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management حسب Islam Eljilany (14151588)

    منشور في 2023
    "…The benefit of the interventional algorithm was based on estimated reduction in the probabilities of clinical events and their cost, added to the avoided cost because of canceled procedures. …"
  4. 184
  5. 185

    Comparative Study on Arabic Text Classification: Challenges and Opportunities حسب Abualigah, Laith

    منشور في 2022
    "…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…"
    احصل على النص الكامل
  6. 186
  7. 187

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 188

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 189

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  10. 190
  11. 191

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …"
    احصل على النص الكامل
  12. 192
  13. 193

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
  14. 194

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
  15. 195

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …"
  16. 196
  17. 197
  18. 198

    Efficient unified Montgomery inversion with multi-bit shifting حسب Savas, Erkay

    منشور في 2005
    "…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 199

    Toward automatic motivator selection for autism behavior intervention therapy حسب Siyam, Nur

    منشور في 2022
    "…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …"
    احصل على النص الكامل
    احصل على النص الكامل
  20. 200

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks حسب Mohamed Massaoudi (16888710)

    منشور في 2024
    "…<p dir="ltr">The transient power grid stability is greatly affected by the unpredictability of inverter-based resources of today's interconnected power grids. …"