بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
would algorithm » mould algorithm (توسيع البحث)
يعرض 361 - 368 نتائج من 368 نتيجة بحث عن '(( elements model algorithm ) OR ((( data would algorithm ) OR ( data processing algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 361

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions حسب Al-Tayyan, Amer

    منشور في 2017
    "…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …"
    احصل على النص الكامل
    article
  2. 362

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …"
  3. 363

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 364

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  5. 365
  6. 366
  7. 367

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. …"
    احصل على النص الكامل
    article
  8. 368

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"