يعرض 141 - 160 نتائج من 261 نتيجة بحث عن '(((( light processing algorithm ) OR ( elements method algorithm ))) OR ( level using algorithms ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 141
  2. 142

    A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation حسب Kfouri, Ronald

    منشور في 2023
    "…Conventional methods, which are used to solve state estimation on the transmission level, require the grid to be observable. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  3. 143

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics حسب Naila Rabbani (291722)

    منشور في 2022
    "…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …"
  4. 144

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …"
    احصل على النص الكامل
  5. 145

    Virtual topologies for massively parallel computations. (c2015) حسب Jahed, Karim A.

    منشور في 2015
    "…Massively parallel computations that are based on such algorithms often suffer from a large communication overhead due to the exponential growth in the number of tasks generated at each search-tree level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  6. 146

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures حسب Ouaiss, Iyad

    منشور في 2017
    "…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 147

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 148

    Artificial intelligence models for predicting the mode of delivery in maternal care حسب Rawan AlSaad (14159019)

    منشور في 2025
    "…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …"
  9. 149

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS حسب Sait, Sadiq M.

    منشور في 2020
    "…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …"
    احصل على النص الكامل
    article
  10. 150
  11. 151
  12. 152

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …"
    احصل على النص الكامل
    article
  13. 153

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  14. 154

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 155

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 156

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 157

    Scrambled Prime Key Encryption حسب Haraty, Ramzi A.

    منشور في 2018
    "…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 158

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
  19. 159

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks حسب Muhammed Al-Ali (16810677)

    منشور في 2023
    "…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …"
  20. 160