Showing 1 - 20 results of 38 for search '(((( implement could algorithm ) OR ( elements rd algorithm ))) OR ( level coding algorithm ))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  4. 4

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 5

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  6. 6

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  7. 7
  8. 8

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  9. 9
  10. 10
  11. 11

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  12. 12
  13. 13

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 14

    A decentralized load balancing approach for parallel search-tree optimization by Abu-Khzam, F.N.

    Published 2017
    “…We propose a general implementation framework that targets highly scalable parallel exact algorithms for NP-hard graph problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15

    KT2C. (c2014) by Al Kawam, Ahmad

    Published 2016
    “…Finally, a parallel design of the KT2C design flow was proposed and the conducted timing analysis showed that large speedups could be achieved if parallelism was implemented.…”
    Get full text
    Get full text
    masterThesis
  16. 16

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  17. 17
  18. 18
  19. 19

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  20. 20

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”