بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
element processing » melt processing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
element processing » melt processing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
-
21
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. …"
احصل على النص الكامل
article -
22
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
23
GENETIC SCHEDULING OF TASK GRAPHS
منشور في 2020"…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. …"
احصل على النص الكامل
article -
24
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
25
Optical recognition of electrical circuit drawings
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
article -
26
Communications in electronic textile systems
منشور في 2017"…A new algorithm based on token grid schemes is presented that takes advantage of the e-textile physical configuration.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
27
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
منشور في 2022"…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …"
-
28
Fast, effective vertex cover kernelization
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
29
Structural similarity evaluation between XML documents and DTDs
منشور في 2007"…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
30
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"
-
31
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
32
-
33
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
34
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
35
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …"
-
36
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"