بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation
منشور في 2020"…Abstract Lookup Table (LUT) method for inverse halftoning is computation less, fast and also yields goods results. This paper proposes a parallel algorithm for inverse halftoning by parallelizing the LUT method of inverse halftoning. …"
احصل على النص الكامل
article -
2
A parallel GPU implementation of the timber wolf placement algorithm
منشور في 2015"…The algorithm has been implemented on a Xeon Workstation using C, and achieved a substantial acceleration on an Nvidia Tesla C2070 card.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
3
Parallel algorithm for hardware implementation of inverse halftoning
منشور في 2005"…A parallel algorithm and its hardware implementation are proposed for an inverse halftone operation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
4
Parallel Algorithm for Hardware Implementation of Inverse Halftoning
منشور في 2005"…A Parallel algorithm and its hardware implementation of Inverse Halftone operation is proposed in this paper. …"
احصل على النص الكامل
article -
5
-
6
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013"…Al-Omari entitled, "Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter," submitted in June 2013. …"
احصل على النص الكامل
doctoralThesis -
7
Intelligent Rapidly-Exploring Random Tree Star Algorithm
منشور في 2024احصل على النص الكامل
doctoralThesis -
8
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
احصل على النص الكامل
article -
9
-
10
-
11
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
12
-
13
-
14
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
15
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
16
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…Two contemporary metaheuristic techniques, particle swarm optimization (PSO) and genetic algorithm (GA), have were simultaneously implemented for combined economic emission dispatch (CEED) of an independent power plant (IPP) situated in Pakistan for different load demands. …"
-
17
-
18
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…A CAD model of a dashboard part is incorporated into a finite element analysis to measure shear and residual stresses. …"
-
19
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
20
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject