بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
mould » could (توسيع البحث), would (توسيع البحث), mold (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
mould » could (توسيع البحث), would (توسيع البحث), mold (توسيع البحث)
-
1
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Additionally, the multi-objective genetic algorithm (MOGA) was utilised to extract the most optimal parameters for the injection moulding process, aiming to minimise shear and residual stress and thereby increase the resistance of the final product. …"
-
2
-
3
-
4
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
5
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
Evolutionary algorithms for state justification in sequential automatic test pattern generation
منشور في 2005"…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both to reduce execution time and improve fault coverage. …"
احصل على النص الكامل
article -
7
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
8
-
9
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
منشور في 2021"…Finally, we show an example of a unique 3-uniform hypergraph similar to those defined by Deza et al. that does not admit a generating integer sequence s. The existence of this hypergraph makes us conjecture an extended generating algorithm for the sequences of Deza et al. to include a much wider class of unique 3-uniform hypergraphs. …"
احصل على النص الكامل
-
10
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…"
-
11
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
12
Correlation Clustering with Overlaps
منشور في 2020"…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
13
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
Efficient unified Montgomery inversion with multi-bit shifting
منشور في 2005"…Computation of multiplicative inverses in finite fields GF( p) and GF(2n) is the most time consuming operation in elliptic curve cryptography, especially when affine co-ordinates are used. Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …"
احصل على النص الكامل
احصل على النص الكامل
article -
15
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
احصل على النص الكامل
article -
16
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
17
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
18
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
19
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"