يعرض 161 - 180 نتائج من 450 نتيجة بحث عن '(( elements method algorithm ) OR ((( data spanning algorithm ) OR ( data models algorithm ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 161

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 162
  3. 163
  4. 164

    Hardware Model of an Expandable RSA Cryptographic System حسب Gutub, Adnan

    منشور في 1998
    "…Data security is an important aspect of information transmission and storage in an electronic form. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 165

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  6. 166
  7. 167

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  8. 168

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network حسب Mohammad Reza Chalak Qazani (13893261)

    منشور في 2024
    "…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
  9. 169
  10. 170
  11. 171

    A Blockchain Model for Secure Communications in Internet of Vehicles حسب Mershad, Khaleel

    منشور في 2021
    "…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 172

    Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends حسب Abdellatif M. Sadeq (16931841)

    منشور في 2024
    "…Based on previous 3D numerical analyses, this study aims to develop data-driven machine learning (ML) models for predicting the flame radius evolution and turbulent flame speeds for diesel, gas-to-liquids (GTL), and their 50/50 blend (by volumetric composition) under different thermodynamic and turbulence operating conditions. …"
  13. 173

    Three approaches to modelling heating and evaporation of monocomponent droplets حسب Dmitrii V. Antonov (21225041)

    منشور في 2024
    "…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
  14. 174

    A Hardware Model of an Expandable RSA Cryptogrsphic System حسب Gutub, Adnan

    منشور في 1998
    "…Data security is an important aspect of information transmission and storage in an electronic form. …"
    احصل على النص الكامل
    masterThesis
  15. 175
  16. 176
  17. 177
  18. 178

    Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications حسب Abdallah Falah Mohammad Aldwekat (22457821)

    منشور في 2025
    "…In interpreting these results, it is important to consider modelling uncertainties, including assumptions and data limitations.…"
  19. 179
  20. 180

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. As it is considered one of the most open and scalable interacting platforms of information, it successfully helps in the positive transfer of different kinds of data between devices in more significant and local operations of the industry. …"