by
Hışıl, Hüseyin.
Format:
El Yazması
Alıntı:
review the multiple-precision algorithms with the contemporary modi¯cations. With this motivation, we
by
Oğuz, Damla.
Format:
El Yazması
Alıntı:
mining algorithms with every update is inefficent. This is called the dynamic update problem of frequent
by
Özardıç, Onur.
Format:
El Yazması
Alıntı:
algorithms. PHAD and other algorithms could not detect considerable portion of the attacks in tests due to
by
Yazıcı, Yeşim.
Format:
El Yazması
Alıntı:
each cases are individually handled and relevant algorithms are obtained. A new higher order operator
by
Kaya, Özgür.
Format:
El Yazması
Alıntı:
and tested by two different algorithms that were modified according to software testing techniques
42.
by
Kaya, Adem.
Format:
El Yazması
Alıntı:
algorithms that provide cheap approximations to the RFB functions, contributing a good stabilizing effect to
by
Aycan, Esra.
Format:
El Yazması
Alıntı:
simulated annealing phase with different neighbourhood searching algorithms. When the experimental data are
by
Kul, Aslı, author.
Format:
El Yazması
Alıntı:
technology and technical limitations. The use of standard access control algorithms is insufficient for IoT
by
Öztürk, Elife, author.
Format:
El Yazması
Alıntı:
information on their nodes or edges. For this reason, pattern mining algorithms can be used to extract data
46.
by
Tanyer, İlker.
Format:
El Yazması
Alıntı:
algorithms to artificial and experimental data, then we compared the performance of these algorithms. State
by
Denizli, Osmancan, author.
Format:
El Yazması
Alıntı:
strategies are investigated, obtained, and created. Maximum Power Point Tracking (MPPT) algorithms for Wind
by
Saydam, Berkay, author.
Format:
El Yazması
Alıntı:
characteristics and algorithms. If not, tasks will cause serious problem like missing deadline for safety-critical
Arama Sonuçlarını Sınırlandır