Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
-
701
A novel technique for fast multiplication
Published 1995“…The design is based on non-overlapped scanning of 3-bit fields of the multiplier. In this algorithm the partial products of the multiplicand and three bits of the multiplier are pre-calculated using only hardwired shifts. …”
Get full text
Get full text
article -
702
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
Get full text
-
703
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. It achieves this performance by utilizing data that is 7 times smaller than that required by other models. …”
-
704
Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls
Published 2025“…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …”
Get full text
-
705
Combined cycle gas turbine system optimization for extended range electric vehicles
Published 2020“…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …”
Get full text
Get full text
Get full text
Get full text
article -
706
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…The first three techniques were automatic, employ correlation, and were variants of template matching, whereas the last one uses convolutional neural networks (CNNs). Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …”
-
707
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
Get full text
-
708
-
709
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
710
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
-
711
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …”
-
712
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
713
Improving the security of SNMP in wireless networks
Published 2017“…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
714
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
715
-
716
Computational evluation of protein energy functions
Published 2014“…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
Get full text
Get full text
Get full text
conferenceObject -
717
Estimation of power grid topology parameters through pilot signals
Published 2016Get full text
Get full text
Get full text
conferenceObject -
718
-
719
Robustness evaluation of real-Time Protocols
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
720
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…This computational framework can expedite and improve the process of finding desirable molecular structures of IL via accurate property predictions in a data-driven manner. …”