بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
update » updated (توسيع البحث)
يعرض 621 - 640 نتائج من 846 نتيجة بحث عن '(( elements update algorithm ) OR ((( data using algorithm ) OR ( solved using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 621

    Joint Planning of Smart EV Charging Stations and DGs in Eco-Friendly Remote Hybrid Microgrids حسب Shaaban, Mostafa

    منشور في 2019
    "…An outer sub-problem determines the locations and sizes of the DG units and charging stations using a non-dominated sorting Genetic algorithm (NSGA-II). …"
    احصل على النص الكامل
    article
  2. 622

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 623

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
  4. 624
  5. 625

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
  6. 626
  7. 627

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 628

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 629

    Query acceleration in distributed database systems حسب Haraty, Ramzi A.

    منشور في 2001
    "…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 630

    Three approaches to modelling heating and evaporation of monocomponent droplets حسب Dmitrii V. Antonov (21225041)

    منشور في 2024
    "…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"
  11. 631
  12. 632

    A novel few shot learning derived architecture for long-term HbA1c prediction حسب Marwa Qaraqe (10135172)

    منشور في 2024
    "…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …"
  13. 633

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 634

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials حسب Ghouti, Lahouari

    منشور في 1997
    "…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
    احصل على النص الكامل
    masterThesis
  15. 635

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations حسب Gutub, Adnan

    منشور في 2007
    "…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 636

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem حسب Tao Li (86810)

    منشور في 2025
    "…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …"
  17. 637

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 638

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 639

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles حسب Wadi, Ali

    منشور في 2017
    "…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …"
    احصل على النص الكامل
    article
  20. 640