بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 461 - 480 نتائج من 634 نتيجة بحث عن '(( element method algorithm ) OR ((( data based algorithm ) OR ( data processing algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 461
  2. 462

    A multi-pretraining U-Net architecture for semantic segmentation حسب Cagla Copurkaya (22502042)

    منشور في 2025
    "…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …"
  3. 463

    SemIndex: Semantic-Aware Inverted Index حسب Chbeir, Richard

    منشور في 2017
    "…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 464

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 465

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  6. 466

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  7. 467

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  8. 468

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques حسب Fares, Samar

    منشور في 2024
    "…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …"
    احصل على النص الكامل
  9. 469

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …"
  10. 470
  11. 471

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 472

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem حسب Habchi, Wassim

    منشور في 2008
    "…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 473

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 474

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
  15. 475

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE حسب Ben-Romdhane, Haïfa

    منشور في 2023
    "…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …"
    احصل على النص الكامل
    article
  16. 476
  17. 477

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
    احصل على النص الكامل
    article
  18. 478

    A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees حسب Saad, Walid

    منشور في 2007
    "…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 479

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 480

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…In this work, we propose a new cache replacement algorithm—Profit SACCS—that is based on the rule-based least profit value. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article