بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 621 - 640 نتائج من 809 نتيجة بحث عن '(( elements method algorithm ) OR ((( data using algorithm ) OR ( based existing algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 621

    A Hardware Model of an Expandable RSA Cryptogrsphic System حسب Gutub, Adnan

    منشور في 1998
    "…Data security is an important aspect of information transmission and storage in an electronic form. …"
    احصل على النص الكامل
    masterThesis
  2. 622

    A microscale evaluation of pavement roughness effects for asset management حسب El Khoury, John

    منشور في 2013
    "…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 623

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services حسب ALBARGHOTHI, ALI BAHA’EDDIN

    منشور في 2018
    "…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
    احصل على النص الكامل
  4. 624

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
    احصل على النص الكامل
    article
  5. 625

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip حسب El-Maleh, A.

    منشور في 2001
    "…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 626

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants حسب Shafiq, M.

    منشور في 2006
    "…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 627

    Exploring Digital Competitiveness through Bayesian Belief Networks حسب Qazi, Abroon

    منشور في 2025
    "…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
    احصل على النص الكامل
    article
  8. 628

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …"
    احصل على النص الكامل
    article
  9. 629

    Process Mining over Unordered Event Streams حسب Awad, Ahmed

    منشور في 2020
    "…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  10. 630

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 631

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem حسب Habchi, Wassim

    منشور في 2008
    "…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 632

    Online Control and Optimization of Directional Drilling حسب unknown

    منشور في 2020
    "…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…"
    احصل على النص الكامل
    masterThesis
  13. 633
  14. 634

    A multi-pretraining U-Net architecture for semantic segmentation حسب Cagla Copurkaya (22502042)

    منشور في 2025
    "…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …"
  15. 635

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  16. 636

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …"
  17. 637
  18. 638

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
  19. 639

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation حسب Jahed, Karim

    منشور في 2016
    "…The key novel characteristics of our system include seamless neighbor discovery and link quality estimation, intelligent clustering and channel allocation algorithms based on constrained minimum spanning trees, robustness against device mobility, and device centric operation with no changes to existing wireless systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 640

    Neural network-based failure rate prediction for De Havilland Dash-8 tires حسب Al-Garni, Ahmed Z.

    منشور في 2006
    "…Six years of data are used for model building and validation. …"
    احصل على النص الكامل
    article