بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
141
-
142
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
143
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
144
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
منشور في 2014"…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
145
Bridge Structural Health Monitoring Using Mobile Sensor Networks
منشور في 2022احصل على النص الكامل
doctoralThesis -
146
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
منشور في 2020"…This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
147
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Predictive maintenance of Electronic Toll Collection System is a major subject in traffic engineering due to the complexity of the system and the difficulty of predicting the components failures. Two types of machine learning models namely classification and regression model were developed and implemented to predict the failure and abnormal behavior of the system. …"
احصل على النص الكامل
-
148
Comparative Study of Control Strategies for Under Actuated Manipulator
منشور في 2006احصل على النص الكامل
doctoralThesis -
149
Optimal shunt compensators at nonsinusoidal busbars
منشور في 1995"…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
احصل على النص الكامل
احصل على النص الكامل
article -
150
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
منشور في 2023"…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …"
-
151
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
منشور في 2020"…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
احصل على النص الكامل
article -
152
-
153
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
منشور في 2021"…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …"
-
154
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
منشور في 2013احصل على النص الكامل
doctoralThesis -
155
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
156
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
منشور في 2008"…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
احصل على النص الكامل
article -
157
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
منشور في 2007"…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
احصل على النص الكامل
article -
158
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
منشور في 2008"…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
احصل على النص الكامل
article -
159
Phased Array Technique for Brain Source Localization
منشور في 2012احصل على النص الكامل
doctoralThesis -
160
Efficient unified Montgomery inversion with multi-bit shifting
منشور في 2005"…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …"
احصل على النص الكامل
احصل على النص الكامل
article