بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
cc3d algorithm » rd algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
cc3d algorithm » rd algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
-
361
-
362
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
363
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
364
-
365
Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system
منشور في 2018"…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …"
-
366
EVALUATION OF OPTIMIZATION METHODS FOR MACHINING ECONOMICS MODELS
منشور في 2020احصل على النص الكامل
article -
367
Combinatorial method for bandwidth selection in wind speed kernel density estimation
منشور في 2019"…In this study, a non-parametric combinatorial method is implemented for obtaining an accurate non-parametric kernel density estimation (KDE)-based statistical model of wind speed, in which the selection of the bandwidth parameter is optimised concerning mean integrated absolute error (L 1 error ) between the true and hypothesised densities. …"
احصل على النص الكامل
-
368
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
منشور في 2024"…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
احصل على النص الكامل
احصل على النص الكامل
-
369
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
منشور في 2014"…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
370
-
371
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
372
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
منشور في 2023"…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …"
-
373
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
منشور في 1989"…The control algorithms developed are readily implementable with present-day microprocessors…"
احصل على النص الكامل
احصل على النص الكامل
article -
374
After generative AI : preparing faculty to transform education, learning, and pedagogy
منشور في 2025"…In a landscape where technological advancements are disrupting and reshaping the educational paradigm, After Generative AI serves as a comprehensive guide to navigate the complexities and opportunities presented by Generative AI (GAI) and guide readers through strategies that must be implemented for a successful journey with GAI. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
bookPart -
375
Towards Multimedia Fragmentation
منشور في 2006"…To validate our approach, we have implemented a prototype computing multimedia predicates implications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
376
Condenser capacity and hyperbolic perimeterImage 1
منشور في 2021"…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
377
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
378
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
منشور في 2007"…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
379
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
380
Comparative Study on Arabic Text Classification: Challenges and Opportunities
منشور في 2022"…This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …"
احصل على النص الكامل