يعرض 81 - 100 نتائج من 179 نتيجة بحث عن '(( experimental study algorithm ) OR ((( data code algorithm ) OR ( data scheduling algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 81

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
  2. 82

    A heuristics for HTTP traffic identification in measuring user dissimilarity حسب Adeyemi R. Ikuesan (14157123)

    منشور في 2020
    "…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …"
  3. 83

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …"
    احصل على النص الكامل
  4. 84

    Correlation Clustering with Overlaps حسب Fakhereldine, Amin

    منشور في 2020
    "…In our experimental analysis, we study the efficiency of our algorithms as well as the effectiveness of allowing vertex splitting. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 85
  6. 86
  7. 87

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…Additionally, potential interaction between differentially expressed lncRNAs such as H19, SNHG5, and GATA2-AS1 with multiple miRNAs has been revealed. Taken together, our data provides thorough analysis of dysregulated protein-coding and non-coding RNAs in CRC highlighting numerous associations and regulatory networks thus providing better understanding of CRC.…"
  8. 88
  9. 89
  10. 90
  11. 91
  12. 92

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE حسب ULLAH, SAAD

    منشور في 2022
    "…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …"
    احصل على النص الكامل
  13. 93

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…"
  14. 94

    Evacuation of a highly congested urban city حسب El Khoury, John

    منشور في 2017
    "…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 95

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 96

    ISSP حسب Zouein, P.P.

    منشور في 2017
    "…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 97
  18. 98

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
  19. 99

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem حسب Abu Zitar, Raed

    منشور في 2021
    "…Moreover, the results achieved by modified CHIOare compared against the results of other 13 well-regarded algorithms. For the first data set, the modifiedCHIO is able to gain the same results as the other comparative methods in two out of ten instances andacceptable results in the rest. …"
    احصل على النص الكامل
  20. 100

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"