بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 41 - 60 نتائج من 921 نتيجة بحث عن '(( element method algorithm ) OR ((( data using algorithm ) OR ( test using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 41
  2. 42
  3. 43

    A neural networks algorithm for data path synthesis حسب Harmanani, Haidar M.

    منشور في 2003
    "…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 44
  5. 45

    Data reductions and combinatorial bounds for improved approximation algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2016
    "…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50

    Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm حسب Odat, Alhaj-Saleh A.

    منشور في 2024
    "…Additionally, these data can be readily applied to compare algorithmic results referenced by (Babu, T.S. et al., 2015; PrasanthRam, J. et al., 2017) [2,3], and contribute to the development of new processes for practical applications.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 51

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering حسب Abu Zitar, Raed

    منشور في 2022
    "…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …"
  12. 52

    A method for optimizing test bus assignment and sizing for system-on-a-chip حسب Harmanani, Haidar M.

    منشور في 2017
    "…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 53
  14. 54
  15. 55

    A multiobjective optimization method for the SOC Test Time, TAM, and power optimization using a strength pareto evolutionary algorithm حسب Harmanani, Haidar M.

    منشور في 2017
    "…This paper presents a multiobjective optimization approach for the SOC test scheduling problem. The method uses a Strength Pareto Evolutionary Algorithm that minimizes the overall test application time in addition to power, wrapper design and TAM assignment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 56

    The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques حسب DOULEH, HANI ABDULLAH YOSEF ABU

    منشور في 2018
    "…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …"
    احصل على النص الكامل
  17. 57
  18. 58

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 59
  20. 60

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology حسب Jaber, Mohammad

    منشور في 2020
    "…Numerous damage assessment and recovery algorithms have been proposed in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis