بدائل البحث:
modelling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
modelling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
-
321
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
322
Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method
منشور في 2021"…The proposed model is thoroughly assessed through an empirical study using a real data set from Australia. …"
-
323
-
324
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…The methods and tools used for modeling the prediction model can be generalized to be used in the rest of the ETC system also. …"
احصل على النص الكامل
-
325
Estimation of power grid topology parameters through pilot signals
منشور في 2016"…Pilot voltage stimulations are injected from distributed generators and the induced currents effects are measured at several nodes in the system. The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
326
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
327
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
-
328
-
329
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
احصل على النص الكامل
-
330
-
331
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
منشور في 2017"…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
332
Turbo-charging dominating set with an FPT subroutine
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
333
Inferential sensing techniques in industrial applications
منشور في 0007"…Real data from a boiler plant is used to develop the model. …"
احصل على النص الكامل
masterThesis -
334
Machine Learning-Based Approach for EV Charging Behavior
منشور في 2021احصل على النص الكامل
doctoralThesis -
335
Design and implementation of a deep learning-empowered m-Health application
منشور في 2023"…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …"
-
336
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
337
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
338
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
339
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"
-
340
Multigrid solvers in reconfigurable hardware
منشور في 2008"…We analyze the implementation performance using the FPGA vendor's tools. We demonstrate the robustness of Multigrid over other similar iterative solvers, such as Jacobi and successive over relaxation (SOR ), in both hardware and software. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article