بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
time processing » image processing (توسيع البحث), text processing (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
time processing » image processing (توسيع البحث), text processing (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
levels using » cells using (توسيع البحث)
element » elements (توسيع البحث)
-
341
3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA
منشور في 2020"…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …"
احصل على النص الكامل
masterThesis -
342
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…<h3>Background and Motivations</h3><p dir="ltr">Physiological signals, such as the Photoplethysmogram (PPG) collected through wearable devices, consistently encounter significant motion artifacts. Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …"
-
343
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis -
344
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
345
Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC
منشور في 2025"…We used Landsat satellite imagery and a Random Forest classification algorithm to map various land cover classes along the GCC coastline. …"
-
346
A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions
منشور في 2024"…Here, the conventional converter helps increase the PV source voltage from one level to another level. The proposed system is investigated by using the MATLAB/Simulink tool.…"
-
347
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
منشور في 2023"…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …"
-
348
An Anchor-Based Localization in Underwater Wireless Sensor Networks for Industrial Oil Pipeline Monitoring
منشور في 2022"…Anchor-based localization techniques are segregated into range-free and range-based processes. Range-based schemes depend on various techniques like angle of arrival (AoA), time of arrival (ToA), time difference of arrival (TDoA), and received signal strength indicator (RSSI). …"
-
349
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
منشور في 2023"…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …"
احصل على النص الكامل
-
350
AUTOMATIC WEINBERGER ARRAY SYNTHESIS FROM UAHPL DESCRIPTION
منشور في 2020"…The system also minimizes the area required by the WA by performing row compaction. An algorithm similar to that used for channel routing is employed for compaction (Hashimoto and Stevens 1971). …"
احصل على النص الكامل
article -
351
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
-
352
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
منشور في 2024"…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …"
-
353
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
354
An automated temporal partitioning tool for a class of DSP applications
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
355
-
356
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
منشور في 2020"…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
357
-
358
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
359
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
360
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …"