بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
defined » designed (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
defined » designed (توسيع البحث)
-
161
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …"
-
162
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
منشور في 2022"…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …"
-
163
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
-
165
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis -
166
Vibration suppression in a cantilever beam using a string-type vibration absorber
منشور في 2017"…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
167
Innovative mobile E-healthcare systems
منشور في 2016"…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
168
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…Therefore, in this study, we find the turning points (i.e., toxicity triggers) making conversations toxic. …"
-
169
Anomaly Detection Based Framework for Profile Monitoring
منشور في 2023احصل على النص الكامل
doctoralThesis -
170
Genetic Fuzzimetric Technique (GFT)
منشور في 2012"…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
171
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
172
Maximal clique enumeration. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
173
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
منشور في 2023"…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …"
-
174
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
منشور في 2022"…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …"
-
175
Crown Structures for Vertex Cover Kernelization
منشور في 2007"…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
176
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
منشور في 2019"…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …"
احصل على النص الكامل
احصل على النص الكامل
-
177
A new minimum curvator multi-step method for unconstrained optimization
منشور في 1998"…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
178
-
179
-
180
Data Redundancy Management in Connected Environments
منشور في 2020"…Connected environments are typically defined as physical infrastructures (e.g., building) equipped with sensors that produce and exchange raw data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject