Showing 241 - 260 results of 269 for search '(((( implement based algorithm ) OR ( elements ipca algorithm ))) OR ( neural coding algorithm ))*', query time: 0.11s Refine Results
  1. 241

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
    Get full text
  2. 242

    Four quadrant robust quick response optimally efficient inverterfed induction motor drive by Islam, S.M.

    Published 1989
    “…Simulation results with a 100-hp motor show that up to 80% savings in controllable losses are achievable at light load, and the motor can reach rated speed in just 750 ms. The control algorithms developed are readily implementable with present-day microprocessors…”
    Get full text
    Get full text
    article
  3. 243

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  4. 244

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  5. 245

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…Qualitative data was gathered from information found in relatively similar studies and from a real estate company in Dubai that allowed this study to be conducted on its databases with the help of its management and staff through interview, discussions, and direct implementations of the tools for testing. The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
    Get full text
  6. 246

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…To validate our approach, we have implemented a prototype computing multimedia predicates implications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 247

    Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions by Sahlan, Monireh Nosrati

    Published 2021
    “…To demonstrate the validity and applicability of the presented method, we offer five significant examples, including generalized Cattaneo diffusion wave and Klein–Gordon equations. The implementation of algorithms exposes high accuracy of the presented numerical method. …”
    Get full text
    article
  8. 248

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  9. 249

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  10. 250

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  11. 251
  12. 252

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
    Get full text
    Get full text
    Get full text
    article
  13. 253

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…The proposed techniques are based on statistical methods considering data compactness and other properties. …”
  14. 254

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  15. 255

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
  16. 256

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …”
  17. 257

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features by Mariam Bahameish (19255789)

    Published 2024
    “…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …”
  18. 258

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    article
  19. 259

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  20. 260

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article