بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
mean algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
mean algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
201
Power system output feedback stabilizer design via geneticalgorithms
منشور في 1997"…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …"
احصل على النص الكامل
احصل على النص الكامل
article -
202
A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition
منشور في 2025"…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …"
-
203
Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography
منشور في 2024"…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …"
-
204
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
-
205
Humanizing AI in medical training: ethical framework for responsible design
منشور في 2023"…Humanizing AI in medical training is crucial to ensure that the design and deployment of its algorithms align with ethical principles and promote equitable healthcare outcomes for both medical practitioners trainees and patients. …"
-
206
-
207
-
208
-
209
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
منشور في 2020"…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
210
Methods for system-on-chip test design, scheduling and optimization. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
211
-
212
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The byte-wise CRC algorithm is translated to hardware and pressed in APHL (VLSI design automation language). …"
احصل على النص الكامل
احصل على النص الكامل
article -
213
-
214
-
215
KNNOR: An oversampling technique for imbalanced datasets
منشور في 2021"…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
-
216
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
منشور في 2025"…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
-
217
-
218
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
-
219
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
منشور في 2022"…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
-
220