يعرض 321 - 340 نتائج من 418 نتيجة بحث عن '(((( implementing a algorithm ) OR ( elements cc3d algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 321
  2. 322

    On the Generation of Quantified Lemmas حسب Gabriel Ebner (23277217)

    منشور في 2018
    "…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …"
  3. 323

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 324
  5. 325

    Digital Image Watermarking Using Balanced Multiwavelets حسب Ghouti, L.

    منشور في 2006
    "…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
    احصل على النص الكامل
    article
  6. 326
  7. 327
  8. 328
  9. 329

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes حسب Wadi, Ali

    منشور في 2019
    "…The identified covariance magnitudes are then utilized to estimate the dynamics of drug release as well as the bias term. The identified a priori knowledge is used to implement an optimal Kalman filter, which was initially tested in a simulation environment. …"
    احصل على النص الكامل
    article
  10. 330

    Failure recovery in wireless content distribution networks with device-to-device cooperation حسب Sharafeddine, Sanaa

    منشور في 2017
    "…Moreover, we propose a constrained version of the minimum spanning tree algorithm with bounds on the height of the tree and the maximum degree per node, in order to capture practical operational constraints for device-to-device cooperation in wireless networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 331

    An easy-to-use scalable framework for parallel recursive backtracking حسب Abu-Khzam, Faisal N.

    منشور في 2013
    "…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 332

    On the disk dimension of planar graphs حسب Abu-khzam, Faisal

    منشور في 2011
    "…More significantly, we devise a direct and highly practical linear-time algorithm to decide whether an arbitrary graph has fixed disk dimension k or less. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 333
  14. 334
  15. 335

    On scalable parallel recursive backtracking حسب Abu-Khzam, Faisal N.

    منشور في 2015
    "…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 336

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks حسب Mohamed Amjath (17542512)

    منشور في 2022
    "…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …"
  17. 337

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
  18. 338

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique حسب Syeda Tayyaba Bukhari (21842078)

    منشور في 2024
    "…To mitigate these risks, it is important to conduct thorough security evaluations of wallets and implement strong protective measures. In recent years, there have been several incidents involving significant losses of cryptocurrency in crypto-wallets, and in this research, a comprehensive evaluation of seed phrase and password attack methods found in the published literature was conducted, and the topic was advanced by addressing the question of whether seed phrases are hackable. …"
  19. 339

    Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms حسب Nemer, Rama

    منشور في 2009
    "…I extended an existing simulation tool to implement argumentation games and used it to run repeated game experiments using combinations of characteristic argumentation games, adapted from literature, and types of adaptive agents under different conditions.The theme used was that of a court setting whereby there is a judge listening to arguments from different agents. …"
    احصل على النص الكامل
  20. 340