بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
non algorithm » rd algorithm (توسيع البحث), colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
non algorithm » rd algorithm (توسيع البحث), colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
-
581
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
582
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
583
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
-
584
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
منشور في 2022"…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …"
-
585
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
منشور في 2006"…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
586
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
587
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
منشور في 2017"…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
احصل على النص الكامل
article -
588
On end-to-end scheduling in wireless cellular networks
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
589
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
احصل على النص الكامل
احصل على النص الكامل
article -
590
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
591
Prolonged ventricular pause associated with ticagrelor use: A case report
منشور في 2023"…Based on the Naranjo algorithm, the likelihood that our patient's prolonged ventricular pause was due to ticagrelor exposure was probable.…"
-
592
Investigation of Forming a Framework to shortlist contractors in the tendering phase
منشور في 2022"…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
احصل على النص الكامل
-
593
-
594
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
احصل على النص الكامل
article -
595
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
منشور في 2023"…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …"
-
596
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. …"
احصل على النص الكامل
masterThesis -
597
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
598
A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks
منشور في 2007احصل على النص الكامل
masterThesis -
599
-
600
Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier
منشور في 2023"…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …"
احصل على النص الكامل
احصل على النص الكامل