Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
201
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
Get full text
-
202
Design and Development of a Synergetic Controller for a Permanent Magnet Synchronous Motor Drive System
Published 2017Get full text
doctoralThesis -
203
-
204
Computation of conformal invariants
Published 2020“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
Get full text
Get full text
Get full text
article -
205
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…The new video coding standard, HEVC, was developed to succeed the current standard, H.264/AVC, as the state of the art in video compression. …”
Get full text
article -
206
A standalone RFID indoor positioning system using passive tags
Published 2011“…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
Get full text
Get full text
Get full text
article -
207
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
208
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
209
Supervised term-category feature weighting for improved text classification
Published 2022“…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
Get full text
Get full text
Get full text
Get full text
article -
210
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
211
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
212
Internal Model Control Structure Using Adaptive Inverse Control Strategy
Published 2003“…In this paper, we propose a new adaptive IMC scheme based on adaptive finite impulse response filters, which can be designed for both minimum and non-minimum phase systems in the same fashion. …”
Get full text
Get full text
article -
213
Computation of conformal invariants
Published 2021“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
-
214
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
215
Decomposition method for solving a nonlinear business cycle model
Published 2003“…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …”
Get full text
Get full text
Get full text
Get full text
article -
216
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
217
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
218
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
Get full text
Get full text
-
219
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…<p dir="ltr">The transient power grid stability is greatly affected by the unpredictability of inverter-based resources of today's interconnected power grids. …”
-
220