بدائل البحث:
modelling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
يعرض 321 - 340 نتائج من 535 نتيجة بحث عن '(( elements method algorithm ) OR ((( data modelling algorithm ) OR ( tools using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 321
  2. 322

    Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…The proposed model is thoroughly assessed through an empirical study using a real data set from Australia. …"
  3. 323
  4. 324

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…The methods and tools used for modeling the prediction model can be generalized to be used in the rest of the ETC system also. …"
    احصل على النص الكامل
  5. 325

    Estimation of power grid topology parameters through pilot signals حسب Hargossian, H.

    منشور في 2016
    "…Pilot voltage stimulations are injected from distributed generators and the induced currents effects are measured at several nodes in the system. The measured data is evaluated through correlation, and a weighed least-square algorithm, applied to the network’s dynamic model, estimates those unknown parameters and provides an accurate snapshot of the power network topology. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 326

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 327

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review حسب Asma Alamgir (18288895)

    منشور في 2021
    "…K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…"
  8. 328
  9. 329

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
    احصل على النص الكامل
  10. 330
  11. 331

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures حسب Ouaiss, Iyad

    منشور في 2017
    "…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 332
  13. 333

    Inferential sensing techniques in industrial applications حسب Shakil,, Muhammad

    منشور في 0007
    "…Real data from a boiler plant is used to develop the model. …"
    احصل على النص الكامل
    masterThesis
  14. 334
  15. 335

    Design and implementation of a deep learning-empowered m-Health application حسب Akhan Akbulut (17380285)

    منشور في 2023
    "…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …"
  16. 336

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams حسب Raun, Kristo

    منشور في 2023
    "…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  17. 337

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  18. 338

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 339

    Blockchain-Based Decentralized Architecture for Software Version Control حسب Muhammad Hammad (17541570)

    منشور في 2023
    "…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"
  20. 340

    Multigrid solvers in reconfigurable hardware حسب Haraty, Ramzi A.

    منشور في 2008
    "…We analyze the implementation performance using the FPGA vendor's tools. We demonstrate the robustness of Multigrid over other similar iterative solvers, such as Jacobi and successive over relaxation (SOR ), in both hardware and software. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article