بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
element » elements (توسيع البحث)
يعرض 1 - 20 نتائج من 261 نتيجة بحث عن '(( element method algorithm ) OR ((( data detection algorithm ) OR ( based mapping algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2

    Stochastic evolution algorithm for technology mapping حسب Al-Mulhem, A.S.

    منشور في 1998
    "…SELF-Map is based on the Stochastic Evolution (SE) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 3
  4. 4

    Physical optimization algorithms for mapping data to distributed-memory multiprocessors حسب Mansour, Nashat

    منشور في 1992
    "…The technique proposed for large problems is based on a pre-mapping graph contraction heuristic algorithm, which results in a smaller search space. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 5

    Map-based mobile positioning system حسب Saab, S. S.

    منشور في 2002
    "…In this paper, a mobile positioning system (MPS) is proposed based on a map-matching algorithm. Using the triangulation or a trilateration technique, the Cell of Origin, Time of Arrival, and Time Difference of Arrival, the mobile is first located within a specified area of about 500x500 squared meters in a GSM network and within a specified area of about 244x244 squared meters in an IS-95 network. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. …"
  7. 7

    A comparison of data mapping algorithms for parallel iterative PDE solvers حسب Mansour, Nashat

    منشور في 1995
    "…Based on the comparison results, we recommend the use of the simplest and fastest (PQ) of the six algorithms considered for sequential compile-time mapping of 2-dimensional meshes.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Indoor Localization Based on Floor Plans and Power Maps حسب Khalifeh, Joe J.

    منشور في 2015
    "…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 13
  14. 14
  15. 15

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  16. 16

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy حسب Raad, M.W.

    منشور في 2006
    "…Gamma pulses from a 3" Na(TI) scintillation detector were captured as single and double pulses for the purpose of testing the peak detection algorithms. The pulse classification technique was tested successfully on a TMS320C6000 high performance floating-point processor yielding a reduction of the execution time to 2 msec…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18
  19. 19

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection حسب HAMDALLAH, KHALID WAJIH TURKI

    منشور في 2011
    "…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
    احصل على النص الكامل
  20. 20

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل