بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
-
461
An automated temporal partitioning tool for a class of DSP applications
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
462
Maximal clique enumeration. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
463
On the Generation of Quantified Lemmas
منشور في 2018"…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …"
-
464
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
465
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
منشور في 2019احصل على النص الكامل
doctoralThesis -
466
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
احصل على النص الكامل
article -
467
Inertial Navigation system of In-pipe Inspection Robot
منشور في 2016احصل على النص الكامل
doctoralThesis -
468
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
منشور في 2013احصل على النص الكامل
doctoralThesis -
469
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
منشور في 2020"…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
470
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
منشور في 2019"…The identified covariance magnitudes are then utilized to estimate the dynamics of drug release as well as the bias term. The identified a priori knowledge is used to implement an optimal Kalman filter, which was initially tested in a simulation environment. …"
احصل على النص الكامل
article -
471
Failure recovery in wireless content distribution networks with device-to-device cooperation
منشور في 2017"…Moreover, we propose a constrained version of the minimum spanning tree algorithm with bounds on the height of the tree and the maximum degree per node, in order to capture practical operational constraints for device-to-device cooperation in wireless networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
472
An easy-to-use scalable framework for parallel recursive backtracking
منشور في 2013"…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
473
On the disk dimension of planar graphs
منشور في 2011"…More significantly, we devise a direct and highly practical linear-time algorithm to decide whether an arbitrary graph has fixed disk dimension k or less. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
474
-
475
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
منشور في 2015"…Cognitive radios are expected to play a major role towards meeting the exploding traffic demand over wireless systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
476
Mobile clinics routing in response to covid-19 outbreak: an intelligent hyperheuristic approach
منشور في 2022"…This paper implements and tests an intelligent variable neighbourhood search algorithm for MCRP.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
477
On scalable parallel recursive backtracking
منشور في 2015"…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
478
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
منشور في 2022"…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …"
-
479
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
-
480
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…To mitigate these risks, it is important to conduct thorough security evaluations of wallets and implement strong protective measures. In recent years, there have been several incidents involving significant losses of cryptocurrency in crypto-wallets, and in this research, a comprehensive evaluation of seed phrase and password attack methods found in the published literature was conducted, and the topic was advanced by addressing the question of whether seed phrases are hackable. …"