Search alternatives:
using algorithm » cosine algorithm (Expand Search)
trained using » brines using (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 541 - 560 results of 741 for search '(( element update algorithm ) OR ((( data using algorithm ) OR ( trained using algorithm ))))', query time: 0.12s Refine Results
  1. 541

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants by Khan, T.

    Published 2006
    “…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …”
    Get full text
    Get full text
    article
  2. 542

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 543

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  4. 544
  5. 545

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
    Get full text
    Get full text
    article
  6. 546

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
    Get full text
    Get full text
    Get full text
    article
  7. 547

    A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making by Sachin Jain (19161721)

    Published 2024
    “…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
  8. 548

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  9. 549
  10. 550

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
    Get full text
    article
  11. 551

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    masterThesis
  12. 552

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
    Get full text
    Get full text
    Get full text
    article
  13. 553

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
    Get full text
  14. 554

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip by El-Maleh, Aiman H.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
    Get full text
    article
  15. 555

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  16. 556

    Exploring Digital Competitiveness through Bayesian Belief Networks by Qazi, Abroon

    Published 2025
    “…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …”
    Get full text
    article
  17. 557

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes by Wadi, Ali

    Published 2019
    “…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
    Get full text
    article
  18. 558

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  19. 559

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
    Get full text
    Get full text
    article
  20. 560

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…”
    Get full text
    masterThesis