يعرض 581 - 600 نتائج من 790 نتيجة بحث عن '(( elements network algorithm ) OR ((( data using algorithm ) OR ( based non algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 581

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 582

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations حسب Gutub, Adnan

    منشور في 2007
    "…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 583

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…An attacker can easily capture data from the available network channel and use it for their own purpose. …"
  4. 584

    Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML حسب Dharmendra Kumar Singh Singh (19517710)

    منشور في 2022
    "…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …"
  5. 585

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants حسب Khan, T.

    منشور في 2006
    "…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 586

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 587

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles حسب Wadi, Ali

    منشور في 2017
    "…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
    احصل على النص الكامل
    article
  8. 588
  9. 589

    Design and development of an embedded controller for roboticmanipulator حسب Bakhashwain, J.M.

    منشور في 1998
    "…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 590

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 591

    Prolonged ventricular pause associated with ticagrelor use: A case report حسب Alaa Rahhal (14150403)

    منشور في 2023
    "…Based on the Naranjo algorithm, the likelihood that our patient's prolonged ventricular pause was due to ticagrelor exposure was probable.…"
  12. 592

    Investigation of Forming a Framework to shortlist contractors in the tendering phase حسب DABASH, MOHANNAD SALAH

    منشور في 2022
    "…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …"
    احصل على النص الكامل
  13. 593
  14. 594

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
    احصل على النص الكامل
    article
  15. 595

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements حسب Stefano Nardean (14151900)

    منشور في 2023
    "…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …"
  16. 596

    A Hardware Model of an Expandable RSA Cryptogrsphic System حسب Gutub, Adnan

    منشور في 1998
    "…Data security is an important aspect of information transmission and storage in an electronic form. …"
    احصل على النص الكامل
    masterThesis
  17. 597

    A microscale evaluation of pavement roughness effects for asset management حسب El Khoury, John

    منشور في 2013
    "…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 598
  19. 599
  20. 600

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier حسب JAIN, SWETA

    منشور في 2023
    "…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …"
    احصل على النص الكامل
    احصل على النص الكامل