بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
581
Online Control and Optimization of Directional Drilling
منشور في 2020"…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…"
احصل على النص الكامل
masterThesis -
582
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
منشور في 2022"…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …"
-
583
-
584
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
585
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
586
Neural network-based failure rate prediction for De Havilland Dash-8 tires
منشور في 2006"…Six years of data are used for model building and validation. …"
احصل على النص الكامل
article -
587
Local convexity preserving rational cubic spline curves
منشور في 1997"…An algorithm is presented which constructs a curve by interpolating the given data points. …"
احصل على النص الكامل
احصل على النص الكامل
article -
588
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
منشور في 2013"…We use this algorithm to build a sensor selection model to choose among location sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
589
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
590
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
591
RRT and Octomap based 3D environment exploration and mapping
منشور في 2020احصل على النص الكامل
doctoralThesis -
592
Automated skills assessment in open surgery: A scoping review
منشور في 2025"…In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …"
-
593
Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique
منشور في 2006"…Six years of data are used for model building and validation. …"
احصل على النص الكامل
article -
594
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…Artificial intelligence (AI) technologies and big data have been increasingly used to enhance the ability to predict and prepare for the patients at risk.…"
-
595
Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment
منشور في 2022"…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. …"
-
596
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
597
Generic metadata representation framework for social-based event detection, description, and linkage
منشور في 2020"…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
598
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …"
-
599
-
600
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article