يعرض 461 - 480 نتائج من 590 نتيجة بحث عن '(((( implementing a algorithm ) OR ( elements method algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 461
  2. 462
  3. 463

    On the Generation of Quantified Lemmas حسب Gabriel Ebner (23277217)

    منشور في 2018
    "…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …"
  4. 464

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 465
  6. 466

    Digital Image Watermarking Using Balanced Multiwavelets حسب Ghouti, L.

    منشور في 2006
    "…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
    احصل على النص الكامل
    article
  7. 467
  8. 468
  9. 469

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity حسب Sweidan, Zahraa

    منشور في 2020
    "…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 470

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes حسب Wadi, Ali

    منشور في 2019
    "…The identified covariance magnitudes are then utilized to estimate the dynamics of drug release as well as the bias term. The identified a priori knowledge is used to implement an optimal Kalman filter, which was initially tested in a simulation environment. …"
    احصل على النص الكامل
    article
  11. 471

    Failure recovery in wireless content distribution networks with device-to-device cooperation حسب Sharafeddine, Sanaa

    منشور في 2017
    "…Moreover, we propose a constrained version of the minimum spanning tree algorithm with bounds on the height of the tree and the maximum degree per node, in order to capture practical operational constraints for device-to-device cooperation in wireless networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 472

    An easy-to-use scalable framework for parallel recursive backtracking حسب Abu-Khzam, Faisal N.

    منشور في 2013
    "…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 473

    On the disk dimension of planar graphs حسب Abu-khzam, Faisal

    منشور في 2011
    "…More significantly, we devise a direct and highly practical linear-time algorithm to decide whether an arbitrary graph has fixed disk dimension k or less. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 474
  15. 475
  16. 476
  17. 477

    On scalable parallel recursive backtracking حسب Abu-Khzam, Faisal N.

    منشور في 2015
    "…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 478

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks حسب Mohamed Amjath (17542512)

    منشور في 2022
    "…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …"
  19. 479

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
  20. 480

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique حسب Syeda Tayyaba Bukhari (21842078)

    منشور في 2024
    "…To mitigate these risks, it is important to conduct thorough security evaluations of wallets and implement strong protective measures. In recent years, there have been several incidents involving significant losses of cryptocurrency in crypto-wallets, and in this research, a comprehensive evaluation of seed phrase and password attack methods found in the published literature was conducted, and the topic was advanced by addressing the question of whether seed phrases are hackable. …"