يعرض 121 - 140 نتائج من 210 نتيجة بحث عن '(( complement td3 algorithm ) OR ((( present work algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 121
  2. 122

    Segmenting Handwritten Arabic Text حسب Haraty, Ramzi A.

    منشور في 2002
    "…This makes the problem of segmentation of Arabic text into characters, and their classification even more difficult. In this work a technique is presented that segments difficult handwritten Arabic text. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 123

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
    احصل على النص الكامل
    article
  4. 124

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 125

    A 3-D vision-based man-machine interface for hand-controlled telerobot حسب Al-Mouhamed, M.A.

    منشور في 2005
    "…This work presents a robust telerobotic system that consists of a real-time vision-based operator hand tracking system (client) and a slave robot (server) which are interconnected through a LAN. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 126

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…This paper presents a standalone IPS using radio frequency identification (RFID) technology. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 127

    Timing influenced general-cell genetic floorplanner حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper we present a timing-influenced floorplanner for general cell IC design. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 128
  9. 129
  10. 130

    A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text حسب Haraty, Ramzi

    منشور في 2001
    "…However, only a small number of research papers and reports have been published in this area, due to the difficult problems associated with Arabic handwritten text processing. In this work, a technique is presented that segments handwritten Arabic text. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 131
  12. 132
  13. 133

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization حسب De Rochechouart, Maxence

    منشور في 2023
    "…This paper presents a reinforcement learning agent-based model that works by incorporating the MESA environment with the Stone Soup radar systems simulator. …"
    احصل على النص الكامل
  14. 134

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet حسب Imran Siddique (12705185)

    منشور في 2024
    "…After that, the ODEs are numerically solved using the bvp4c algorithm. Regarding validation, the present results align with earlier published research. …"
  15. 135

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test حسب Hasan T. Abbas (8115014)

    منشور في 2019
    "…There is substantial evidence that lifestyle modifications and drug intervention can prevent diabetes, therefore, an early identification of high risk individuals is important to design targeted prevention strategies. In this paper, we present an automatic tool that uses machine learning techniques to predict the development of type 2 diabetes mellitus (T2DM). …"
  16. 136
  17. 137

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…This paper extends our previous work as reported (Eltaras in International Conference on Web Information Systems Engineering, Springer, Singapore, 2024) and proposes three advanced algorithms to broaden the applicability of gradient inversion attacks. …"
  18. 138

    Online Control and Optimization of Directional Drilling حسب unknown

    منشور في 2020
    "…The work presents an online control scheme for real time optimization of drilling parameters to maximize rate of penetration and minimize the deviation from the planned well bore trajectory, stick-slip oscillations, and bit wear. …"
    احصل على النص الكامل
    masterThesis
  19. 139
  20. 140

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"