بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
يعرض 641 - 660 نتائج من 689 نتيجة بحث عن '(( elements method algorithm ) OR ((( based learning algorithms ) OR ( based method algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 641

    Control of cardiac alternans by mechanical and electrical feedback حسب Yapari, Felicia

    منشور في 2014
    "…The coupled model includes the active stress which defines the mechanical properties of the tissue and is utilized in the feedback algorithm as an independent input from the pacing based controller realization in alternans annihilation. …"
    احصل على النص الكامل
    article
  2. 642

    Fuzzy controllers design using space-filling curves حسب Elshafei-Ahmed, M.

    منشور في 1998
    "…We present a clustering technique for fuzzy rules based on Hilbert space-filling curves (SFC). SFC scans an n-dimensional space and reduces it to a curve, i.e. a one-dimensional line. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 643

    Fuzzy Controllers Design Using Space-Filling Curves حسب Elshafei-Ahmed, M

    منشور في 2020
    "…The paper introduces first the Hilber Space-filling curves, and outlines algorithms for clustering and adaptive clustering which demonstrate the SFC efficient self-organizing features. …"
    احصل على النص الكامل
    article
  4. 644

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions حسب Sahlan, Monireh Nosrati

    منشور في 2021
    "…The implementation of algorithms exposes high accuracy of the presented numerical method. …"
    احصل على النص الكامل
    article
  5. 645

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) حسب Al-Sukairi, Abdallah

    منشور في 2020
    "…Computer Aided Education (CAE) system is a computer software that aids in the education of a student. Computer-based educational systems are valuable tools to improve learning. …"
    احصل على النص الكامل
    article
  6. 646
  7. 647

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…In this paper, we provide an improved comparison method to deal with such resemblances. Our approach is based on the concept of tree edit distance, introducing the notion of commonality between sub-trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 648

    Fine-grain watermarking for intellectual property protection حسب Stefano Giovanni Rizzo (18615112)

    منشور في 2019
    "…The core method is based on homoglyph characters substitution for latin symbols and whitespaces. …"
  9. 649

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 650

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…A prototype has been developed to evaluate the optimality and performance of our method. Results demonstrate higher comparison accuracy with respect to alternative XML comparison methods, while timing experiments reflect the significant impact of semantic similarity assessment on overall system performance.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 651
  12. 652
  13. 653

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …"
    احصل على النص الكامل
  14. 654

    Failure recovery in wireless content distribution networks with device-to-device cooperation حسب Sharafeddine, Sanaa

    منشور في 2017
    "…We present low complexity effective algorithms based on clustering and tree construction methods in order to address three different types of dynamic node behavior, namely new devices joining the network, existing devices leaving the network, and existing devices moving locally within the network. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 655

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem حسب Abu Zitar, Raed

    منشور في 2021
    "…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …"
    احصل على النص الكامل
  16. 656

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 657
  18. 658

    Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol حسب Santiago Hors-Fraile (5950823)

    منشور في 2018
    "…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …"
  19. 659

    Computer-aided detection of Melanoma using geometric features حسب Azar, Danielle

    منشور في 2017
    "…The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 660

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article