Showing 541 - 560 results of 758 for search '(((( developing new algorithm ) OR ( element data algorithm ))) OR ( data using algorithm ))', query time: 0.12s Refine Results
  1. 541

    Innovative mobile E-healthcare systems by Haraty, Ramzi A.

    Published 2016
    “…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 542

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  3. 543

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …”
  4. 544
  5. 545

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation by Saqr Khalil Saeed Thabet (19517560)

    Published 2022
    “…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…”
  6. 546

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  7. 547

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 548

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…This has been fueled through the development of new DL architectures. Yet genomics possesses unique challenges that requires customization and development of new DL models.…”
  9. 549

    Three approaches to modelling heating and evaporation of monocomponent droplets by Dmitrii V. Antonov (21225041)

    Published 2024
    “…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”
  10. 550

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …”
    Get full text
    Get full text
    Get full text
    article
  11. 551

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …”
  12. 552

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 553

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  14. 554

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article
  15. 555
  16. 556

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 557

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  18. 558
  19. 559

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
    Get full text
    Get full text
    article
  20. 560

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
    Get full text
    Get full text
    Get full text
    article