يعرض 61 - 78 نتائج من 78 نتيجة بحث عن '(( element method algorithm ) OR ((( main component algorithm ) OR ( data banking algorithm ))))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 61

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  2. 62

    Improving Active Resonance Damping and Unbalanced Voltage Mitigation Based on Combined DDSRF and Washout Filter in Islanded Microgrids حسب Ehsan Akbari (10803914)

    منشور في 2024
    "…Finally, Level 4 integrates a controller based on extracting positive and negative sequence components using the dual decoupled synchronous reference frame (DDSRF) algorithm. …"
  3. 63

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 64

    Color edge enhancement based fuzzy segmentation of license plates حسب Syed, Y.A.

    منشور في 2005
    "…The proposed ALPR technique consists of two main modules: plate locating module and plate segmentation module. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 65
  6. 66

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …"
    احصل على النص الكامل
  7. 67
  8. 68
  9. 69

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  10. 70

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 71

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…A number of combined algorithms and classifiers are proposed to use in this solution based on the encouraging outcomes observed from the systematic literature review and experts’ survey, including Local Binary Pattern descriptor, Haar-Like Descriptor, Ada Boost, Cascade classifiers, Affine Transformation, Histogram Equalization, Gaussian Filter, Principal Component Analysis which are embedded in OpenCV or MATLAB application. …"
    احصل على النص الكامل
  12. 72

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 73

    Approximate XML structure validation based on document–grammar tree similarity حسب Tekli, Joe

    منشور في 2015
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 74

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 75

    What are artificial intelligence literacy and competency? A comprehensive framework to support them حسب Thomas K.F., Chiu

    منشور في 2024
    "…This study goes beyond knowledge (AI literacy), and its two main goals are to (i) define AI literacy and competency by adding the aspects of confidence and self-reflective mindsets, and (ii) propose a more comprehensive framework for K–12 AI education. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 76

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  17. 77

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 78

    Deep Learning-Based Fault Diagnosis of Photovoltaic Systems: A Comprehensive Review and Enhancement Prospects حسب Majdi Mansouri (16869885)

    منشور في 2021
    "…The performance of the FDD method depends mainly on the quality of the extracted features including real-time changes, phase changes, trend changes, and faulty modes. …"