يعرض 41 - 60 نتائج من 96 نتيجة بحث عن '(( movement data algorithm ) OR ((( implement making algorithm ) OR ( element data algorithm ))))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 41

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…"
  2. 42
  3. 43

    Optimal shunt compensators at nonsinusoidal busbars حسب El-Amin, I.M.

    منشور في 1995
    "…However, since there are limitations on the practical values of shunt capacitor, a discretizing approach making use of standard shunt capacitor values is employed to guarantee a solution that can be implemented…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 44

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS حسب El-Amin, I.M.

    منشور في 2020
    "…However, since there are limitations on the practical values of shunt capacitor, a discretizing approach making use of standard shunt capacitor values is employed to guarantee a solution that can be implemented.…"
    احصل على النص الكامل
    article
  5. 45

    A hybrid EDF/FIFO queue for efficient real time flow handling حسب Fawaz, W.

    منشور في 2006
    "…This approach allows reducing EDF’s implementation complexity while making efficient use of its optimal flow management. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 46

    A novel approach for real time flows scheduling حسب Fawaz, W.

    منشور في 2006
    "…However, EDF is complex and expensive as far as implementation is concerned, especially when compared with the standard FIFO algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 47
  8. 48

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …"
    احصل على النص الكامل
  9. 49
  10. 50

    Toward automatic motivator selection for autism behavior intervention therapy حسب Siyam, Nur

    منشور في 2022
    "…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …"
    احصل على النص الكامل
    احصل على النص الكامل
  11. 51

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …"
    احصل على النص الكامل
  12. 52
  13. 53

    Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms حسب Nemer, Rama

    منشور في 2009
    "…Once all arguments have been presented, the judge must make a ruling: i.e decide which arguments are valid and hence which agents win by presenting them. …"
    احصل على النص الكامل
  14. 54

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT حسب Sait, Sadiq M.

    منشور في 2006
    "…The implementations exhibit considerable improvement in terms of both solution quality and runtime.…"
    احصل على النص الكامل
    article
  15. 55
  16. 56

    Digital Image Watermarking Using Balanced Multiwavelets حسب Ghouti, L.

    منشور في 2006
    "…Therefore, considerable reduction in computational complexity is possible, making this transform a good candidate for real-time watermarking implementations such as audio broadcast monitoring and DVD video watermarking. …"
    احصل على النص الكامل
    article
  17. 57

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …"
  18. 58

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services حسب ALBARGHOTHI, ALI BAHA’EDDIN

    منشور في 2018
    "…In the second stage, an Arabic QA approach is implemented to answer user questions relevant to e-government services. …"
    احصل على النص الكامل
  19. 59

    A forward-backward Kalman for the estimation of time-variant channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 2005
    "…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 60

    Modelling Exchange Rates during Currency Crisis using Neural Networks حسب Nasr, G. E.

    منشور في 2006
    "…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject