Search alternatives:
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
Showing 761 - 780 results of 902 for search '(( element deer algorithm ) OR ((( data using algorithm ) OR ( tests using algorithm ))))', query time: 0.11s Refine Results
  1. 761
  2. 762

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  3. 763

    Low-Cost Reduced Navigation System for Mobile Robot in Indoor/Outdoor Environments by Al Khatib, Ehab

    Published 2020
    “…For the indoor environment, where GPS signals are blocked, another EKF algorithm is proposed using low cost depth sensor (Microsoft Kinect stream). …”
    Get full text
    article
  4. 764

    Failure recovery in wireless content distribution networks with device-to-device cooperation by Sharafeddine, Sanaa

    Published 2017
    “…We present results for various network scenarios using simulations and experimental test bed to demonstrate the effectiveness of the proposed algorithms in terms of performance efficiency, computational complexity, and practical implementation feasibility.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 765

    Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy by Aram Rostami (22045274)

    Published 2026
    “…Treatment plans were created using the Acuros XB algorithm in both Eclipse versions. …”
  6. 766
  7. 767
  8. 768
  9. 769

    On Equivalent Circuit Model-Based State-of-Charge Estimation for Lithium-Ion Batteries in Electric Vehicles by Fatma Ahmed (11084787)

    Published 2025
    “…A third-order equivalent circuit model is employed for the LIB based on electrochemical impedance spectra test results, with model parameters identified using a particle swarm optimization algorithm. …”
  10. 770

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
  11. 771

    On scalable parallel recursive backtracking by Abu-Khzam, Faisal N.

    Published 2015
    “…Many of these algorithms use recursive backtracking as their core solution paradigm. …”
    Get full text
    Get full text
    Get full text
    article
  12. 772
  13. 773

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Mara'Beh (17337892)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  14. 774

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Ayesh Marabeh (21142247)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  15. 775

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 776

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  17. 777
  18. 778

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  19. 779
  20. 780