بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
search » research (توسيع البحث)
يعرض 481 - 500 نتائج من 726 نتيجة بحث عن '(( elements search algorithm ) OR ((( based method algorithm ) OR ( data processing algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 481

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 482
  3. 483

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 484

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…The benchmarking experiments of execution time and precision on architecture search and evaluation process showed better performance on recently available GPUs making it feasible to adopt architecture search based methods on large datasets.…"
  5. 485

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning حسب ALFALASI, FARIS Jr

    منشور في 2023
    "…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …"
    احصل على النص الكامل
  6. 486
  7. 487

    On the Generation of Quantified Lemmas حسب Gabriel Ebner (23277217)

    منشور في 2018
    "…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …"
  8. 488
  9. 489

    Optimization metaheuristic for software testing حسب Mansour, Nashat

    منشور في 2013
    "…This paper presents an evolutionary method for testing web applications. Although state-based testing has been reported, few papers have addressed modern web applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 490
  11. 491

    A matheuristic approach for solving the 2-connected dominating set problem حسب Raka Jovanovic (17947838)

    منشور في 2019
    "…The algorithm is based on a Greedy Randomized Adaptive Search Procedure (GRASP). …"
  12. 492

    On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints حسب Temadher A. Almaadeed (14151288)

    منشور في 2022
    "…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …"
  13. 493
  14. 494

    Structural similarity evaluation between XML documents and DTDs حسب Tekli, J.

    منشور في 2007
    "…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 495

    A multi-pretraining U-Net architecture for semantic segmentation حسب Cagla Copurkaya (22502042)

    منشور في 2025
    "…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …"
  16. 496

    MoveSchedule حسب Zouein, Pierette

    منشور في 1995
    "…The resource levels describe different methods or crew-sizes for performing the activity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 497

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …"
  18. 498

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 499

    Efficient Scalable VLSI Architecture for Montgomery Inversion in GF(p) حسب Gutub, Adnan

    منشور في 2004
    "…We suggest a new correction phase for a previously proposed almost Montgomery inverse algorithm to calculate the inversion in hardware. We also propose an efficient hardware algorithm to compute the inverse by multi-bit shifting method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 500

    Impacts of Feeder Reconfiguration on Renewable Resources Allocation in Balanced and Unbalanced Distribution Systems حسب Zidan, Aboelsood A.

    منشور في 2016
    "…In this article, network reconfiguration and distributed generation allocation in distribution networks are dealt with simultaneously while imposing an objective of minimizing energy loss. The proposed method, which is based on a genetic algorithm, takes into consideration the uncertainty related to renewable distributed generation output power and the load variability. …"
    احصل على النص الكامل
    article