يعرض 141 - 160 نتائج من 273 نتيجة بحث عن '(((( implement ii algorithm ) OR ( elementary learning algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 141
  2. 142

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 143

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  4. 144

    Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units حسب ElKassar, AbdulNasser

    منشور في 2014
    "…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 145
  6. 146

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers حسب Tarhini, Abbas

    منشور في 2020
    "…This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 147

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Predictive maintenance of Electronic Toll Collection System is a major subject in traffic engineering due to the complexity of the system and the difficulty of predicting the components failures. Two types of machine learning models namely classification and regression model were developed and implemented to predict the failure and abnormal behavior of the system. …"
    احصل على النص الكامل
  8. 148
  9. 149

    Optimal shunt compensators at nonsinusoidal busbars حسب El-Amin, I.M.

    منشور في 1995
    "…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 150

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management حسب Islam Eljilany (14151588)

    منشور في 2023
    "…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …"
  11. 151

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS حسب El-Amin, I.M.

    منشور في 2020
    "…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
    احصل على النص الكامل
    article
  12. 152
  13. 153

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach حسب Aya Hasan Alkhereibi (17151070)

    منشور في 2021
    "…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …"
  14. 154
  15. 155

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
  16. 156

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning حسب Siddiqi, Umair F.

    منشور في 2008
    "…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
    احصل على النص الكامل
    article
  17. 157

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning حسب Siddiqi, Umair F.

    منشور في 2007
    "…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
    احصل على النص الكامل
    article
  18. 158

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning حسب Siddiqi, Umair F.

    منشور في 2008
    "…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
    احصل على النص الكامل
    article
  19. 159
  20. 160

    Efficient unified Montgomery inversion with multi-bit shifting حسب Savas, Erkay

    منشور في 2005
    "…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article