بدائل البحث:
implementing control » implementing iot (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
wt algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
elements wt » elements _ (توسيع البحث)
implementing control » implementing iot (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
wt algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
elements wt » elements _ (توسيع البحث)
-
81
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
82
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
83
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
84
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis -
85
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
86
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
87
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
منشور في 2021"…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …"
-
88
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
89
Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan
منشور في 2020"…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …"
احصل على النص الكامل
article -
90
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
91
Software maintenance tool. (c1995)
منشور في 1995احصل على النص الكامل
احصل على النص الكامل
masterThesis -
92
Scheduling and allocation in high-level synthesis using stochastic techniques
منشور في 2020"…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …"
احصل على النص الكامل
article -
93
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
-
94
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
منشور في 2012احصل على النص الكامل
doctoralThesis -
95
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…<p dir="ltr">Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. …"
-
96
-
97
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
-
98
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
99
-
100