Showing 181 - 200 results of 221 for search '(((( element control algorithm ) OR ( complement cnn algorithm ))) OR ( level using algorithm ))', query time: 0.11s Refine Results
  1. 181

    Virtual topologies for massively parallel computations. (c2015) by Jahed, Karim A.

    Published 2015
    “…Massively parallel computations that are based on such algorithms often suffer from a large communication overhead due to the exponential growth in the number of tasks generated at each search-tree level. …”
    Get full text
    Get full text
    masterThesis
  2. 182

    The architecture of a highly reconfigurable RISC dataflow array processor by Sait, Sadiq M.

    Published 2020
    “…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …”
    Get full text
    article
  3. 183

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. With the advent of fog computing, personal mobile devices in a given geographical area may also comprise a very dynamic distributed storage system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 184

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 185

    Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review by Loay A. Salman (14150322)

    Published 2023
    “…</p><h3>Conclusion</h3><p dir="ltr">This study demonstrated the potential of AI as a valuable complement for planning TKA, exhibiting a satisfactory level of reliability in predicting TKA implant sizes. …”
  6. 186

    Software defect prediction. (c2019) by Moussa, Rebecca

    Published 2019
    “…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 187

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…Models analyzing images at the architectural level yielded higher accuracy (94.7 %), sensitivity (94.1 %), and specificity (98.2 %) compared to cellular-level analysis. …”
  8. 188

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …”
    Get full text
    Get full text
    masterThesis
  9. 189

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. …”
  10. 190

    Artificial intelligence models for predicting the mode of delivery in maternal care by Rawan AlSaad (14159019)

    Published 2025
    “…</p><h3>Objectives</h3><p dir="ltr">This study aims to evaluate and compare the predictive accuracy of AI algorithms in predicting the mode of delivery (vaginal or cesarean) using routinely collected antepartum data from electronic health records (EHRs). …”
  11. 191

    Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges by Sk Injamamul Islam (14111241)

    Published 2024
    “…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …”
  12. 192

    An intelligent EPROM silicon compiler by Amin, A.

    Published 1991
    “…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
    Get full text
    Get full text
    article
  13. 193
  14. 194

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 195
  16. 196

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…XACML (eXtensible Access Control Markup Language) policies, which are widely adopted for defining and controlling dynamic access among Web/cloud services, are becoming more complex in order to handle the significant growth in communication and cooperation between individuals and composed services. …”
    Get full text
    Get full text
    Get full text
    article
  17. 197
  18. 198

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…However, the exorbitant expenses associated with 7T MRI scanners hinder their broad use in research and clinical facilities. Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  19. 199

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 200