بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
elements deer » elementi per (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
elements deer » elementi per (توسيع البحث)
-
681
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
احصل على النص الكامل
article -
682
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
احصل على النص الكامل
احصل على النص الكامل
article -
683
Exploring Digital Competitiveness through Bayesian Belief Networks
منشور في 2025"…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
احصل على النص الكامل
article -
684
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
منشور في 2019"…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …"
احصل على النص الكامل
article -
685
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
686
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
687
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
منشور في 2022"…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. For reconfiguration, a simple 5 × 5 PV array is considered, and a new physical relocation procedure based on the position square method is proposed. …"
-
688
-
689
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …"
-
690
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …"
-
691
Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle
منشور في 2025"…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
692
Local convexity preserving rational cubic spline curves
منشور في 1997"…An algorithm is presented which constructs a curve by interpolating the given data points. …"
احصل على النص الكامل
احصل على النص الكامل
article -
693
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
منشور في 2013"…We use this algorithm to build a sensor selection model to choose among location sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
694
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
منشور في 2017احصل على النص الكامل
doctoralThesis -
695
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
696
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
697
RRT and Octomap based 3D environment exploration and mapping
منشور في 2020احصل على النص الكامل
doctoralThesis -
698
Particle swarm optimization for multimachine power systemstabilizer design
منشور في 2001"…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
699
A fuzzy basis function network for generator excitation control
منشور في 1997"…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
700
Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique
منشور في 2006"…Six years of data are used for model building and validation. …"
احصل على النص الكامل
article