Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
crcy algorithm » carlo algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
crcy algorithm » carlo algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
-
141
A method for data path synthesis using neural networks
Published 2017“…The proposed algorithm has a running time complexity of O(1) for a neural network with n vertices and c cliques. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
142
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
Published 2024“…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …”
Get full text
article -
143
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
144
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…To solve it, we first propose the high-complexity branch, reduce and bound (BRB) algorithm to find the global optimal solution for relatively small scale scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
145
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
146
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
147
-
148
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…Electroencephalogram (EEG) analysis is crucial for diagnosing brain disorders, but it can be challenging for medical practitioners to interpret complex EEG signals and make accurate diagnoses. To address this, our study focuses on visualizing complex EEG signals in a format easily understandable by medical professionals and deep learning algorithms. …”
-
149
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
150
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. …”
-
151
Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas
Published 2024“…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
-
152
Design and simulation of digital controllers using pipelined architecture
Published 1990“…Some complex control algorithms require large volume of computations in a short time. …”
Get full text
masterThesis -
153
The political economy of AI: a content analysis of ChatGPT outputs and anti-Palestinian media bias
Published 2026“…Grounded in research-based teaching methods, and employing a mixed-method content and frequency analysis and comparison of ChatGPT outputs in English and Arabic, this article expands research on AI biases, algorithmic oppression and digital divides within the context of digital Orientalism and anti-Palestinianism. …”
Get full text
Get full text
Get full text
Get full text
article -
154
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both to reduce execution time and improve fault coverage. …”
Get full text
article -
155
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both the reduce execution time and improve fault coverage. …”
Get full text
Get full text
article -
156
A method for efficient NoC test scheduling using deterministic routing
Published 2017“…Network-on-Chip (NoC) is an on-chip communication methodology that has been proposed as an alternative to bus-based communication in order to cope with the increased complexity in embedded designs. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
157
Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing
Published 2020“…Finally, we propose a low-complexity heuristic resource allocation algorithm based on this novel theoretical discovery. …”
-
158
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
159
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
160
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article