بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
g algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث)
element g » elements _ (توسيع البحث), clement k (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
could algorithm » mould algorithm (توسيع البحث), carlo algorithm (توسيع البحث), colony algorithm (توسيع البحث)
g algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث)
element g » elements _ (توسيع البحث), clement k (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
21
KT2C. (c2014)
منشور في 2016"…Finally, a parallel design of the KT2C design flow was proposed and the conducted timing analysis showed that large speedups could be achieved if parallelism was implemented.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
22
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
احصل على النص الكامل
article -
23
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
24
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
25
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
26
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
منشور في 2021"…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …"
-
27
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
28
-
29
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
30
A novel few shot learning derived architecture for long-term HbA1c prediction
منشور في 2024"…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…"
-
31
A machine learning approach for localization in cellular environments
منشور في 2018"…The integration takes advantage of the robust clustering ability of WKNN and implements a neural network that could estimate the position within each cluster. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
32
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
احصل على النص الكامل
article -
33
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
-
34
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
-
35
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …"
-
36
-
37
-
38
UML-based regression testing for OO software
منشور في 2010"…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
39
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…It had an impressive accuracy of 99.99%, and it could mitigate DDoS attacks in less than 3 s. We conducted a comparative analysis of various models and algorithms used in the related works. …"
-
40
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
منشور في 2020احصل على النص الكامل
doctoralThesis