يعرض 181 - 200 نتائج من 324 نتيجة بحث عن '(((( implemented based algorithm ) OR ( elements based algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 181

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 182

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements حسب Emara-Shabaik, Husam

    منشور في 2020
    "…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …"
    احصل على النص الكامل
    article
  3. 183
  4. 184
  5. 185

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…A new algorithm based on token grid schemes is presented that takes advantage of the e-textile physical configuration.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 186
  7. 187

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 188

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 189

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  10. 190

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
  11. 191

    Parallel tabu search in a heterogeneous environment حسب Al-Yamani, A.

    منشور في 2003
    "…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 192

    Timing influenced general-cell genetic floorplanner حسب Sait, Sadiq M.

    منشور في 2020
    "…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 193

    A novel technique for fast multiplication حسب Sait, Sadiq M.

    منشور في 2020
    "…In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithm is modelled in a hardware description language and its VLSI chip implemented. …"
    احصل على النص الكامل
    article
  14. 194

    Multidimensional Gains for Stochastic Approximation حسب Saab, Samer S.

    منشور في 2019
    "…Necessary and sufficient conditions for M≥ N algorithms are presented pertaining to algorithm stability and convergence of the estimate error covariance matrix. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 195

    Assessment of static pile design methods and non-linear analysis of pile driving حسب Abou-Jaoude, Grace G.

    منشور في 2006
    "…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 196

    A Blockchain Model for Secure Communications in Internet of Vehicles حسب Mershad, Khaleel

    منشور في 2021
    "…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 197

    Toward automatic motivator selection for autism behavior intervention therapy حسب Siyam, Nur

    منشور في 2022
    "…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …"
    احصل على النص الكامل
    احصل على النص الكامل
  18. 198
  19. 199
  20. 200

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The first model is a univariate model based on past GC values. The second model is a trivariate model based on GC, price and car registration time series. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject