يعرض 521 - 540 نتائج من 735 نتيجة بحث عن '(( elements method algorithm ) OR ((( data using algorithm ) OR ( data finding algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 521

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework حسب Tayyabah Hasan (18427887)

    منشور في 2022
    "…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …"
  2. 522

    Scatter search for homology modeling حسب Mansour, Nashat

    منشور في 2016
    "…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 523

    Video features with impact on user quality of experience حسب Abbas, Nadine

    منشور في 2021
    "…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 524

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
  5. 525
  6. 526

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
  7. 527
  8. 528

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 529

    Corona power loss computation in bundled bipolar conductors حسب Al-Hamouz, Z.M.

    منشور في 2000
    "…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 530

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 531

    Query acceleration in distributed database systems حسب Haraty, Ramzi A.

    منشور في 2001
    "…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 532

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 533

    Three approaches to modelling heating and evaporation of monocomponent droplets حسب Dmitrii V. Antonov (21225041)

    منشور في 2024
    "…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
  14. 534
  15. 535

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …"
  16. 536

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 537

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials حسب Ghouti, Lahouari

    منشور في 1997
    "…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
    احصل على النص الكامل
    masterThesis
  18. 538

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations حسب Gutub, Adnan

    منشور في 2007
    "…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 539

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants حسب Khan, T.

    منشور في 2006
    "…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 540

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article