Showing 1 - 20 results of 64 for search '(((( element rf algorithm ) OR ( dependent processing algorithm ))) OR ( neural coding algorithm ))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 4
  5. 5

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain by Al Sadawi, Alia

    Published 2021
    “…The objective is to minimize different cost types while satisfying constraints such as resources availability, customer service level, and tasks dependency relation. The algorithm proved its effectiveness by allocating tasks with higher priority and weight while taking into consideration customers’ Service Level Agreement, time, and different types of costs, which led to a lower total cost of the batching process. …”
    Get full text
    article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application by Aram Rostami (22045274)

    Published 2024
    “…K<sub>med</sub> is calculated for D<sub>m.m</sub> and D<sub>w.w </sub>algorithm types in bone and lung media for both photon beams. …”
  12. 12
  13. 13
  14. 14

    Deep Learning-Based Coding Strategy for Improved Cochlear Implant Speech Perception in Noisy Environments by Billel Essaid (22047578)

    Published 2025
    “…<p dir="ltr">Automatic speech recognition (ASR) and speech enhancement are essential tools in modern life, aiding not only in machine interaction but also in supporting individuals with hearing impairments. These processes begin with capturing speech in analog form and applying signal processing algorithms to ensure compatibility with devices like cochlear implants (CIs). …”
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  20. 20