Search alternatives:
injection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
sampling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 1 - 20 results of 68 for search '(( elements method algorithm ) OR ((( data injection algorithm ) OR ( image sampling algorithm ))))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
    Get full text
    article
  8. 8
  9. 9
  10. 10

    Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar by Sankaran, Rajendran

    Published 2022
    “…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …”
    Get full text
    Get full text
    Get full text
    article
  11. 11

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  12. 12
  13. 13

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  14. 14

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
  15. 15
  16. 16

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  17. 17

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  18. 18

    Parallel Algorithm for Hardware Implementation of Inverse Halftoning by Siddiqi, Umair F.

    Published 2005
    “…The 15-pixel parallel version of the algorithm was tested on sample images and a simple and effective method has been used to overcome quality degradation due to pixel loss in the proposed algorithm. …”
    Get full text
    article
  19. 19

    Parallel algorithm for hardware implementation of inverse halftoning by Siddiqi, U.F.

    Published 2005
    “…The 15-pixel parallel version of the algorithm was tested on sample images and a simple and effective method has been used to overcome quality degradation due to pixel loss in the proposed algorithm. …”
    Get full text
    Get full text
    article
  20. 20