Search alternatives:
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
-
121
-
122
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
123
A comparative study of regression testing methods. (c1996)
Published 1996Get full text
Get full text
masterThesis -
124
A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation
Published 2023“…Conventional methods, which are used to solve state estimation on the transmission level, require the grid to be observable. …”
Get full text
Get full text
Get full text
masterThesis -
125
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
126
Virtual topologies for massively parallel computations. (c2015)
Published 2015“…Massively parallel computations that are based on such algorithms often suffer from a large communication overhead due to the exponential growth in the number of tasks generated at each search-tree level. …”
Get full text
Get full text
masterThesis -
127
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
Published 2017“…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
128
Regression Testing of Database Applications
Published 2002“…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
Get full text
Get full text
Get full text
article -
129
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
Get full text
-
130
Artificial intelligence models for predicting the mode of delivery in maternal care
Published 2025“…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …”
-
131
CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS
Published 2020“…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …”
Get full text
article -
132
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
133
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
134
The architecture of a highly reconfigurable RISC dataflow array processor
Published 2020“…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …”
Get full text
article -
135
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
Get full text
Get full text
Get full text
masterThesis -
136
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
Get full text
Get full text
Get full text
article -
137
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
138
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
139
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
-
140
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …”