يعرض 281 - 300 نتائج من 327 نتيجة بحث عن '(((( implement ii algorithm ) OR ( elements based algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 281

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…</p> <h2>Conclusion</h2> <p> Genetic algorithms can be used along with finite element analysis and zigzag cutouts to tune the band gap of plates subjected to base-excitations. …"
  2. 282
  3. 283

    Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system حسب Ali Farhat (1461478)

    منشور في 2018
    "…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …"
  4. 284

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 285

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 286
  7. 287

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
    احصل على النص الكامل
    masterThesis
  8. 288

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? حسب Raymon van Dinter (10521952)

    منشور في 2023
    "…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …"
  9. 289

    Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain حسب Farshad Rahimi Ghashghaei (20880995)

    منشور في 2025
    "…We comprehensively analyse the proposed ensemble learning, including algorithmic details, implementation specifics, and experimental results. …"
  10. 290

    Enhancing e-learning through AI: advanced techniques for optimizing student performance حسب Rund Mahafdah (21399854)

    منشور في 2024
    "…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …"
  11. 291

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 292

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  13. 293

    An efficient cache replacement strategy for the hybrid cache consistency approach حسب Haraty, Ramzi A.

    منشور في 2010
    "…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 294

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque, Ahmed

    منشور في 2023
    "…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 295

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  16. 296

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 297

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  18. 298

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…The newly proposed ideas are found efficient in terms of performance, ease of implementation, and computational complexity. Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …"
  19. 299

    Extracranial traumatic carotid artery dissections in children حسب Chamoun, Roukoz B.

    منشور في 2008
    "…Thirty of 34 patients were treated with medical therapy or observation; 2 of 4 patients treated with observation alone died. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 300

    Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine حسب Majd A. AbuAlrob (22392505)

    منشور في 2025
    "…This review examines AI’s transformative potential, its current limitations, and the multidisciplinary initiatives driving its effective implementation in epilepsy care.</p><h2>Other Information</h2> <p> Published in: Epilepsy & Behavior<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.yebeh.2025.110327" target="_blank">https://dx.doi.org/10.1016/j.yebeh.2025.110327</a></p>…"