يعرض 221 - 240 نتائج من 434 نتيجة بحث عن '(((( implement based algorithm ) OR ( element per algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 221

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …"
    احصل على النص الكامل
    article
  2. 222

    On the complexity of multi-parameterized cluster editing حسب Abu-Khzam, Faisal

    منشور في 2017
    "…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 223

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 224
  5. 225

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 226

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 227
  8. 228

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
  9. 229
  10. 230
  11. 231

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring حسب Muzna Yumman (16494023)

    منشور في 2020
    "…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
  12. 232

    A Blockchain Model for Secure Communications in Internet of Vehicles حسب Mershad, Khaleel

    منشور في 2021
    "…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 233

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Despite the impact of such prediction capabilities, no work in the literature or industry has investigated the futuristic prediction of HbA1c using current blood glucose (BG) measurements. For the first time in the literature, this work proposes a novel FSL-derived algorithm for the long-term prediction of clinical HbA1c measures. …"
  14. 234
  15. 235
  16. 236
  17. 237
  18. 238
  19. 239
  20. 240