Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
wsd algorithm » rd algorithm (Expand Search)
element » elements (Expand Search)
Showing 61 - 80 results of 84 for search '(((( element method algorithm ) OR ( complement wsd algorithm ))) OR ( level making algorithm ))', query time: 0.11s Refine Results
  1. 61

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 62

    On the exact recovery of the FFT of noisy signals using a non-subtractively dither-quantized input channel by Cheded, L.

    Published 2003
    “…Through several algorithmic changes, the FFT and its variants have not only breathed a new lease of life into an otherwise latent classical DFT algorithm but also led to an explosion of applications in numerous areas. …”
    Get full text
    Get full text
    article
  3. 63

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side by Ali Sharida (17947847)

    Published 2024
    “…Nevertheless, both IMPC and MPC rely significantly on the dynamic model of the power converter. This makes them susceptible to uncertainties and disturbances. …”
  4. 64
  5. 65

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  6. 66

    Artificial intelligence models for predicting the mode of delivery in maternal care by Rawan AlSaad (14159019)

    Published 2025
    “…Five machine learning algorithms were evaluated: XGBoost, AdaBoost, random forest, decision tree, and multi-layer perceptron (MLP) classifier. …”
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…The advanced prediction of HbA1c enables patients and physicians to make changes to treatment plans and lifestyle to avoid elevated HbA1c levels, which can consequently lead to irreversible health complications. …”
  12. 72
  13. 73

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  14. 74

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  15. 75

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 76

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  17. 77

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …”
  18. 78

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives by Yassine Himeur (14158821)

    Published 2021
    “…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …”
  19. 79

    A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation by Kfouri, Ronald

    Published 2023
    “…Conventional methods, which are used to solve state estimation on the transmission level, require the grid to be observable. This is not directly applicable to distribution grids. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 80

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”