يعرض 201 - 220 نتائج من 619 نتيجة بحث عن '(( element search algorithm ) OR ((( data processing algorithm ) OR ( designed using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 201

    A quantum algorithm for evolving open quantum dynamics on quantum computing devices حسب Zixuan Hu (13719685)

    منشور في 2020
    "…<p dir="ltr">Designing quantum algorithms for simulating quantum systems has seen enormous progress, yet few studies have been done to develop quantum algorithms for open quantum dynamics despite its importance in modeling the system-environment interaction found in most realistic physical models. …"
  2. 202

    Artificial intelligence-based methods for fusion of electronic health records and imaging data حسب Farida Mohsen (16994682)

    منشور في 2022
    "…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …"
  3. 203
  4. 204

    Design of a vibration absorber for harmonically forced damped systems حسب Issa, Jimmy

    منشور في 2013
    "…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 205

    Power system output feedback stabilizer design via geneticalgorithms حسب Abdel-Magid, Y.L.

    منشور في 1997
    "…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 206

    A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition حسب Hanif Heidari (22467148)

    منشور في 2025
    "…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …"
  7. 207

    Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography حسب Muhammad Ali Akbar (16875915)

    منشور في 2024
    "…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …"
  8. 208

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
  9. 209

    Humanizing AI in medical training: ethical framework for responsible design حسب Mohammed Tahri Sqalli (18420840)

    منشور في 2023
    "…Humanizing AI in medical training is crucial to ensure that the design and deployment of its algorithms align with ethical principles and promote equitable healthcare outcomes for both medical practitioners trainees and patients. …"
  10. 210
  11. 211
  12. 212
  13. 213

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands حسب Peng, Wang

    منشور في 2020
    "…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 214
  15. 215
  16. 216

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The byte-wise CRC algorithm is translated to hardware and pressed in APHL (VLSI design automation language). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 217
  18. 218
  19. 219

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  20. 220

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks حسب Najam Us Sahar Riyaz (22927843)

    منشور في 2025
    "…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"