يعرض 21 - 40 نتائج من 54 نتيجة بحث عن '(( implementing low algorithm ) OR ((( elementi per algorithm ) OR ( level coding algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 21

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …"
    احصل على النص الكامل
    article
  2. 22
  3. 23

    Modeling of magnetization curves for computer-aided design حسب Abuelma’atti, M.T.

    منشور في 1993
    "…Using the proposed algorithm, sine-series functions can be obtained for nearly rectangular magnetization curves with any required accuracy both in the high-flux and in the low-flux regions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 24
  5. 25

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
    احصل على النص الكامل
    article
  6. 26
  7. 27

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…However, these methods tend to converge towards local solutions with a low convergence rate. In order to address this issue in GKSO, a more refined version called I-GKSO is implemented. …"
    احصل على النص الكامل
  8. 28
  9. 29
  10. 30
  11. 31

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 32
  13. 33

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…The proposed algorithm first estimates the location of the reader, neglecting tag-reader angle-path loss. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 34
  15. 35

    A nash bargaining solution for energy-efficient content distribution over wireless networks with mobile-to-mobile cooperation حسب Yaacoub, Elias

    منشور في 2018
    "…The problem is formulated as a Nash bargaining game, and the Nash bargaining solution is derived. Furthermore, a low complexity utility minimization algorithm is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 36
  17. 37

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
  18. 38

    Failure recovery in wireless content distribution networks with device-to-device cooperation حسب Sharafeddine, Sanaa

    منشور في 2017
    "…We present results for various network scenarios using simulations and experimental test bed to demonstrate the effectiveness of the proposed algorithms in terms of performance efficiency, computational complexity, and practical implementation feasibility.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 39

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
  20. 40

    Blockchain-Based Decentralized Architecture for Software Version Control حسب Muhammad Hammad (17541570)

    منشور في 2023
    "…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …"