بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
light processing » signal processing (توسيع البحث), text processing (توسيع البحث), melt processing (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
light processing » signal processing (توسيع البحث), text processing (توسيع البحث), melt processing (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
-
141
A comparative study of regression testing methods. (c1996)
منشور في 1996احصل على النص الكامل
احصل على النص الكامل
masterThesis -
142
A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation
منشور في 2023"…Conventional methods, which are used to solve state estimation on the transmission level, require the grid to be observable. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
143
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
منشور في 2022"…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …"
-
144
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …"
احصل على النص الكامل
-
145
Virtual topologies for massively parallel computations. (c2015)
منشور في 2015"…Massively parallel computations that are based on such algorithms often suffer from a large communication overhead due to the exponential growth in the number of tasks generated at each search-tree level. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
146
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
منشور في 2017"…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
147
Regression Testing of Database Applications
منشور في 2002"…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
148
Artificial intelligence models for predicting the mode of delivery in maternal care
منشور في 2025"…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …"
-
149
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
منشور في 2020"…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
احصل على النص الكامل
article -
150
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
منشور في 2023احصل على النص الكامل
doctoralThesis -
151
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
منشور في 2009احصل على النص الكامل
doctoralThesis -
152
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …"
احصل على النص الكامل
article -
153
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
154
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
155
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
156
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
157
Scrambled Prime Key Encryption
منشور في 2018"…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
158
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
منشور في 2024"…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
-
159
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
منشور في 2023"…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …"
-
160