بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
581
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
-
582
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
منشور في 2023"…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
583
Cross entropy error function in neural networks
منشور في 2002"…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
584
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
585
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
منشور في 2006"…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
586
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
587
On end-to-end scheduling in wireless cellular networks
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
588
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
احصل على النص الكامل
احصل على النص الكامل
article -
589
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
590
-
591
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
احصل على النص الكامل
article -
592
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. …"
احصل على النص الكامل
masterThesis -
593
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
594
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
منشور في 2024"…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …"
احصل على النص الكامل
article -
595
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
احصل على النص الكامل
article -
596
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
احصل على النص الكامل
احصل على النص الكامل
article -
597
Exploring Digital Competitiveness through Bayesian Belief Networks
منشور في 2025"…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
احصل على النص الكامل
article -
598
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
599
Online Control and Optimization of Directional Drilling
منشور في 2020"…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…"
احصل على النص الكامل
masterThesis -
600
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis