بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
-
181
Computation of conformal invariants
منشور في 2020"…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
182
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
منشور في 2020"…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …"
احصل على النص الكامل
article -
183
Improving INS/GPS Integration for Mobile Robotics Applications
منشور في 2008احصل على النص الكامل
doctoralThesis -
184
-
185
Communications in electronic textile systems
منشور في 2017"…A new algorithm based on token grid schemes is presented that takes advantage of the e-textile physical configuration.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
186
Decomposition method for solving a nonlinear business cycle model
منشور في 2003"…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
187
A standalone RFID indoor positioning system using passive tags
منشور في 2011"…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
188
Approximate XML structure validation technical report
منشور في 2014"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
189
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
190
Computation of conformal invariants
منشور في 2021"…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
-
191
Parallel tabu search in a heterogeneous environment
منشور في 2003"…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …"
احصل على النص الكامل
احصل على النص الكامل
article -
192
Timing influenced general-cell genetic floorplanner
منشور في 2020"…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …"
احصل على النص الكامل
احصل على النص الكامل
article -
193
A novel technique for fast multiplication
منشور في 2020"…In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithm is modelled in a hardware description language and its VLSI chip implemented. …"
احصل على النص الكامل
article -
194
Multidimensional Gains for Stochastic Approximation
منشور في 2019"…Necessary and sufficient conditions for M≥ N algorithms are presented pertaining to algorithm stability and convergence of the estimate error covariance matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
195
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
196
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
197
Toward automatic motivator selection for autism behavior intervention therapy
منشور في 2022"…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …"
احصل على النص الكامل
احصل على النص الكامل
-
198
A method for efficient NoC test scheduling using deterministic routing
منشور في 2017"…The method uses a deterministic routing algorithm that minimizes test time while avoiding blocking. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
199
Supervised term-category feature weighting for improved text classification
منشور في 2022"…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
200
Cross entropy error function in neural networks
منشور في 2002"…The first model is a univariate model based on past GC values. The second model is a trivariate model based on GC, price and car registration time series. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject