بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 501 - 520 نتائج من 742 نتيجة بحث عن '(( elements method algorithm ) OR ((( data testing algorithm ) OR ( data using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 501
  2. 502

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant حسب ALMutawa, J.

    منشور في 2007
    "…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 503
  4. 504

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) حسب Stamboulian, Mouses Hrag

    منشور في 2015
    "…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 505
  6. 506

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  7. 507

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization حسب Majdi Mansouri (16869885)

    منشور في 2022
    "…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
  8. 508

    High-order parametrization of the hypergeometric-Meijer approximants حسب Abouzeid M. Shalaby (16329062)

    منشور في 2023
    "…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …"
  9. 509
  10. 510
  11. 511

    A forward-backward Kalman for the estimation of time-variant channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 2005
    "…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 512

    Shuffled Linear Regression with Erroneous Observations حسب Saab, Samer S.

    منشور في 2019
    "…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 513

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  14. 514

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance حسب Amr Zeedan (17983750)

    منشور في 2023
    "…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …"
  15. 515

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  16. 516

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 517

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  18. 518

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 0000
    "…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 519

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 520