بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
point algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
point algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
521
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
522
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…"
-
523
-
524
Regression Testing of Database Applications
منشور في 2002"…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
525
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
526
Query acceleration in distributed database systems
منشور في 2001"…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
527
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
528
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
-
529
A novel few shot learning derived architecture for long-term HbA1c prediction
منشور في 2024"…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …"
-
530
Cross entropy error function in neural networks
منشور في 2002"…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
531
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
منشور في 1997"…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
احصل على النص الكامل
masterThesis -
532
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
منشور في 2006"…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
533
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
534
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
منشور في 2017"…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
احصل على النص الكامل
article -
535
On end-to-end scheduling in wireless cellular networks
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
536
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
احصل على النص الكامل
احصل على النص الكامل
article -
537
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
538
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
منشور في 2024"…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …"
-
539
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
540