بدائل البحث:
function algorithm » auction algorithm (توسيع البحث)
section algorithm » auction algorithm (توسيع البحث)
يعرض 21 - 40 نتائج من 372 نتيجة بحث عن 'i ((((section algorithm) OR (function algorithm))) OR (detection algorithm))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 21
  2. 22

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions حسب Liu, Wenpeng

    منشور في 2017
    "…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 23
  4. 24
  5. 25

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …"
  6. 26

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …"
  7. 27
  8. 28

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization حسب Abu Zitar, Raed

    منشور في 2024
    "…The Extended Kalman Filter (EKF) is used for state estimation with proper clutter and detection models. Since we use Multi-objects to track, the Joint Probability Distribution Function (JPDA) estimates the best measurement values with a preset gating threshold. …"
    احصل على النص الكامل
  9. 29

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents حسب Muhammad E. H. Chowdhury (14150526)

    منشور في 2019
    "…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …"
  10. 30
  11. 31

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  12. 32
  13. 33

    A machine learning model for early detection of diabetic foot using thermogram images حسب Amith Khandakar (14151981)

    منشور في 2021
    "…Several studies have reported that thermogram images may help to detect an increase in plantar temperature prior to DFU. …"
  14. 34
  15. 35

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"