بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implementing » implemented (توسيع البحث)
-
161
Generic DFT approach for pattern sensitive faults in word-orientedmemories
منشور في 1996"…By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …"
احصل على النص الكامل
احصل على النص الكامل
article -
162
Automated skills assessment in open surgery: A scoping review
منشور في 2025"…We highlight the progress in automated skills assessment during open surgery with advancements in sensor technology, and AI algorithms with high prediction accuracies. Further developments in data acquisition and processing methods are essential to facilitate clinical implementation of such technologies.…"
-
163
A novel design technique for generating building form
منشور في 2018"…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…"
احصل على النص الكامل
-
164
A novel approach for real time flows scheduling
منشور في 2006"…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
165
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
166
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…This implementation is modeled using VHDL in a parametrizable manner. …"
احصل على النص الكامل
masterThesis -
167
A machine learning approach for localization in cellular environments
منشور في 2018"…The integration takes advantage of the robust clustering ability of WKNN and implements a neural network that could estimate the position within each cluster. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
168
Platoon Transitional Maneuver Control System: A Review
منشور في 2021"…The most recent articles on platoon control maneuvers have been analyzed based on the proposed control algorithm, homogeneously or heterogeneously of platoon members, type of platoon maneuver, the aim of control problem, type of implementation, and used simulation tools. …"
-
169
Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams
منشور في 2021"…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …"
-
170
A method for data path synthesis using neural networks
منشور في 2017"…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
171
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
-
172
Decomposition method for solving a nonlinear business cycle model
منشور في 2003"…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
173
Design Feasibility Study For A 500 Gbits/s AES Cypher Decypher Engine
منشور في 2006"…A feasibility study for implementing the AES encryption algorithm in hardware achieving 500 Gbits/s is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
174
A forward-backward Kalman for the estimation of time-variant channels in OFDM
منشور في 2005"…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
احصل على النص الكامل
احصل على النص الكامل
article -
175
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. …"
احصل على النص الكامل
article -
176
A standalone RFID indoor positioning system using passive tags
منشور في 2011"…The inputs of the proposed algorithm are the measurements of the backscattered signal power propagated from nearby RFID tags and a tag-path position database. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
177
Developing a framework for using face recognition in transit payment transactions
منشور في 2021"…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …"
احصل على النص الكامل
-
178
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
منشور في 2025"…This study contributes to the literature by offering practical insights into the use of AI for inclusive education and as well outlining key challenges that must be addressed in order to get effective AI implementation. The significance of this research stems from its focus on a rarely explored context providing valuable insights into how AI can be leveraged to enhance inclusive education in similar educational settings. …"
احصل على النص الكامل
-
179
A decentralized load balancing approach for parallel search-tree optimization
منشور في 2017"…As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
180
A hybrid EDF/FIFO queue for efficient real time flow handling
منشور في 2006"…But still, EDF is complex and expensive as far as implementation is concerned. As a main contribution in this paper, we therefore propose a hybrid EDF/FIFO queue management approach, which consists of a short EDF queue completed by a FIFO queue. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject