بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
يعرض 61 - 80 نتائج من 912 نتيجة بحث عن '(( elements control algorithm ) OR ((( test using algorithm ) OR ( data using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 61

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers حسب Mansour, Nashat

    منشور في 1997
    "…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 62
  3. 63

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 64

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy حسب Raad, M.W.

    منشور في 2006
    "…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 65
  6. 66
  7. 67

    A comparison of data mapping algorithms for parallel iterative PDE solvers حسب Mansour, Nashat

    منشور في 1995
    "…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 68

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data حسب Haraty, Ramzi A.

    منشور في 2015
    "…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 69

    DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data حسب Assaf, Ali

    منشور في 2022
    "…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …"
    احصل على النص الكامل
  15. 75

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test حسب Hasan T. Abbas (8115014)

    منشور في 2019
    "…Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …"
  16. 76
  17. 77

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection حسب HAMDALLAH, KHALID WAJIH TURKI

    منشور في 2011
    "…The data was used as training and testing sets to analyze certain machine learning algorithms in terms of performance (cost / benefit analysis) and accuracy (mean error square and confusion matrix). …"
    احصل على النص الكامل
  18. 78

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 79
  20. 80