Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
element » elements (Expand Search)
Showing 401 - 420 results of 490 for search '(((( element study algorithm ) OR ( develop based algorithm ))) OR ( neural modeling algorithm ))', query time: 0.12s Refine Results
  1. 401

    Diagnosing failed distribution transformers using neural networks by Farag, A.S.

    Published 2001
    “…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. …”
    Get full text
    Get full text
    article
  2. 402

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs by Kouatli, Issam

    Published 2008
    “…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 403
  4. 404
  5. 405

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 406

    Digital Image Watermarking Using Balanced Multiwavelets by Ghouti, L.

    Published 2006
    “…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
    Get full text
    article
  7. 407

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
  8. 408
  9. 409
  10. 410

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  11. 411
  12. 412
  13. 413

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”
  14. 414

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…An original MHFE-based formulation of the two-phase flow model is taken as a reference for the development of the BCPR preconditioner, in which the set of system unknowns comprises both element and face pressures, in addition to the cell saturations, resulting in a $$3\times 3$$ 3 × 3 block-structured Jacobian matrix with a $$2\times 2$$ 2 × 2 inner pressure problem. …”
  15. 415
  16. 416

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The benchmarking experiments of execution time and precision on architecture search and evaluation process showed better performance on recently available GPUs making it feasible to adopt architecture search based methods on large datasets.</p> <h2>Conclusions</h2> <p>We proposed the use of differential architecture search method (DASSI) to perform SS classification on raw DNA sequences, and discovered new neural network models with low number of tunable parameters and competitive performance compared with manually engineered architectures. …”
  17. 417

    Computer-aided detection of Melanoma using geometric features by Azar, Danielle

    Published 2017
    “…The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 418

    Thermal convection of fluid in fractured media by Sfeir, Abdallah

    Published 1995
    “…Including this phenomenon in a modelling process led us to propose a development of the UDEC code. The computational algorithm is based on the differences between the rates of convective and conductive heat transfers. …”
    Get full text
    Get full text
    Get full text
    article
  19. 419

    Prolonged ventricular pause associated with ticagrelor use: A case report by Alaa Rahhal (14150403)

    Published 2023
    “…Based on the Naranjo algorithm, the likelihood that our patient's prolonged ventricular pause was due to ticagrelor exposure was probable.…”
  20. 420

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…The main focus of the work is to review artificial intelligence-based systems for dysgraphia diagnosis in children. …”