يعرض 1 - 20 نتائج من 109 نتيجة بحث عن '(( elements method algorithm ) OR ((( data hiding algorithm ) OR ( based taking algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …"
    احصل على النص الكامل
  2. 2
  3. 3
  4. 4
  5. 5

    A genetic-based algorithm for fuzzy unit commitment model حسب Mantawy, A.H.

    منشور في 2000
    "…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    A reduced model for phase-change problems with radiation using simplified PN approximations حسب Belhamadia, Youssef

    منشور في 2025
    "…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
    احصل على النص الكامل
    article
  7. 7

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm حسب De Rochechouart, Maxence

    منشور في 2023
    "…The goal is to achieve efficient resource allocation based on different preset cost functions that take into account several local and global attributes. …"
    احصل على النص الكامل
  8. 8
  9. 9
  10. 10

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study حسب Alkhodari, Mohanad Ahmed

    منشور في 2021
    "…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
    احصل على النص الكامل
    article
  11. 11
  12. 12

    Design of adaptive arrays based on element position perturbations حسب Dawoud, M.M.

    منشور في 1993
    "…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    A kernelization algorithm for d-Hitting Set حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    Trial-based dominance for comparing both the speed and accuracy of stochastic optimizers with standard non-parametric tests حسب Kenneth V. Price (17877002)

    منشور في 2023
    "…This paper describes how trial-based dominance can totally order this two-variable dataset of outcomes so that traditional non-parametric methods can determine the better of two algorithms when one is faster, but less accurate than the other, i.e. when neither algorithm dominates. …"
  19. 19

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements حسب Stefano Nardean (14151900)

    منشور في 2023
    "…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …"
  20. 20

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل