بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
taking algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 181 - 200 نتائج من 295 نتيجة بحث عن '(( element method algorithm ) OR ((( data including algorithm ) OR ( path taking algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 181

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  2. 182
  3. 183

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 184
  5. 185
  6. 186

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. The MLs' performance is evaluated using metrics including accuracy, sensitivity, specificity, and F1-score for the M1, and coefficient of variation of root mean squared error, mean absolute percentage error (MAPE), and median absolute percentage error for the M2. …"
  7. 187

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
    احصل على النص الكامل
    article
  8. 188

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
    احصل على النص الكامل
    article
  9. 189
  10. 190

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  11. 191
  12. 192

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 193

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis حسب Ghada Al-Hussain (18295426)

    منشور في 2022
    "…Two reviewers independently selected the studies, extracted data from the included studies, and assessed the risk of bias. …"
  14. 194

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review حسب Uzair Shah (15740699)

    منشور في 2022
    "…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …"
  15. 195

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 196
  17. 197

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 198
  19. 199
  20. 200

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…Data extracted from the included studies were synthesized narratively.…"