بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
sample processing » image processing (توسيع البحث), melt processing (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
sample processing » image processing (توسيع البحث), melt processing (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
481
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
482
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
-
483
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
منشور في 0000"…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
484
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
485
PERF solutions for distributed query optimization. (c1999)
منشور في 1999احصل على النص الكامل
احصل على النص الكامل
masterThesis -
486
A new estimator and approach for estimating the subpopulation parameters
منشور في 2021"…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
-
487
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
488
Starvation Problem in CPU Scheduling for Multimedia Systems
منشور في 2002"…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
احصل على النص الكامل
article -
489
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
490
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
منشور في 2020"…Three years of data are used for model building and validation. …"
احصل على النص الكامل
article -
491
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
منشور في 2023"…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
-
492
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
منشور في 2024احصل على النص الكامل
doctoralThesis -
493
-
494
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
منشور في 2015"…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
495
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
منشور في 2007"…Three years of data are used for model building and validation. …"
احصل على النص الكامل
article -
496
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
منشور في 2024"…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …"
احصل على النص الكامل
-
497
Competitive learning/reflected residual vector quantization for coding angiogram images
منشور في 2003"…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
article -
498
Severity-Based Prioritized Processing of Packets with Application in VANETs
منشور في 2019"…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
-
499
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
500
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article