يعرض 1 - 20 نتائج من 28 نتيجة بحث عن '(((( implementing could algorithm ) OR ( element g algorithm ))) OR ( self scheduling algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms حسب Harmanani, H. M.

    منشور في 2007
    "…This paper presents an efficient method for concurrent built-in self-test synthesis and test scheduling in high-level synthesis. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2
  3. 3
  4. 4

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5
  6. 6
  7. 7
  8. 8

    Assessment of static pile design methods and non-linear analysis of pile driving حسب Abou-Jaoude, Grace G.

    منشور في 2006
    "…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 9

    A hybrid approach for XML similarity حسب Tekli, Joe

    منشور في 2007
    "…Owing to an unparalleled increasing use of the XML standard, developing efficient techniques for comparing XML-based documents becomes essential in information retrieval (IR) research. Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 11

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12
  13. 13
  14. 14

    KT2C. (c2014) حسب Al Kawam, Ahmad

    منشور في 2016
    "…Finally, a parallel design of the KT2C design flow was proposed and the conducted timing analysis showed that large speedups could be achieved if parallelism was implemented.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 15

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach حسب Aya Hasan Alkhereibi (17151070)

    منشور في 2021
    "…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …"
  16. 16
  17. 17
  18. 18

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…"
  19. 19

    A machine learning approach for localization in cellular environments حسب Abdallah, Ali A.

    منشور في 2018
    "…The integration takes advantage of the robust clustering ability of WKNN and implements a neural network that could estimate the position within each cluster. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 20

    Digital Image Watermarking Using Balanced Multiwavelets حسب Ghouti, L.

    منشور في 2006
    "…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
    احصل على النص الكامل
    article