Showing 1 - 20 results of 98 for search '(((( implement detection algorithm ) OR ( elementi rd algorithm ))) OR ( level finding algorithm ))', query time: 0.13s Refine Results
  1. 1

    Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation by Abualigah, Laith

    Published 2023
    “…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
    Get full text
  2. 2

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) by Wehbe, Gioia Wahib

    Published 2016
    “…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…”
    Get full text
    Get full text
    masterThesis
  3. 3

    Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images by Abu Zitar, Raed

    Published 2023
    “…These techniques work well for bi-level thresholding, but when used to find the appropriate thresholds for multi-level thresholding, there will be issues with long calculation times, high computational costs, and the need for accuracy improvements. …”
    Get full text
  4. 4
  5. 5

    Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv... by Atif Iqbal (5504636)

    Published 2019
    “…Topology offers a reduced switch count solution with simple control strategy compared to the existing seven-level inverters. Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
  6. 6
  7. 7

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
    Get full text
  8. 8
  9. 9

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
  10. 10

    The Role of KM in Enhancing AI Algorithms and Systems by AlGhanem, Hani

    Published 2020
    “…The current study shows the relation between KM processes and AI systems from a higher perspective, giving different options to apply other KM processes for the same AI algorithm to reduce any implementation challenges and enhance the adoption level. …”
    Get full text
    Get full text
  11. 11

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
    Get full text
    Get full text
    article
  12. 12
  13. 13
  14. 14

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
    Get full text
    article
  15. 15

    Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms by Harmanani, H. M.

    Published 2007
    “…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …”
    Get full text
    Get full text
    Get full text
    article
  16. 16

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  17. 17
  18. 18

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  19. 19

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem by Abu Zitar, Raed

    Published 2023
    “…On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …”
    Get full text
  20. 20