Showing 101 - 120 results of 278 for search '(((( implement ii algorithm ) OR ( element finding algorithm ))) OR ( neural coding algorithm ))', query time: 0.12s Refine Results
  1. 101

    MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments by Hend Gedawy (23275984)

    Published 2022
    “…For MAESTRO, we build an integrated architecture that includes two new scheduling algorithms for assigning computing workloads to FemtoClouds. …”
  2. 102
  3. 103

    Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams by Eduardo Feo-Flushing (23276023)

    Published 2021
    “…Lastly, we illustrate the application of the mission planning framework in two demonstrators. These implementations show how the framework can be successfully integrated with different platforms, including mobile robots (ground and aerial), wearable computers, and smart-phone devices.…”
  4. 104

    A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI by Oishi Jyoti (21593819)

    Published 2025
    “…While research in ASD diagnosis is evolving through the application of machine learning (ML) techniques, practical implementation in clinical settings has not progressed at the same pace. …”
  5. 105
  6. 106

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 107
  8. 108
  9. 109

    Multidimensional Gains for Stochastic Approximation by Saab, Samer S.

    Published 2019
    “…Necessary and sufficient conditions for M≥ N algorithms are presented pertaining to algorithm stability and convergence of the estimate error covariance matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 110

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  11. 111

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  12. 112
  13. 113

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The results suggest that the proposed algorithm, the optimal Kalman filter, performs better than the other two in all tests performed.…”
    Get full text
    article
  14. 114
  15. 115

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Programs were designed to implement both the original and the enhanced algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  16. 116
  17. 117

    Supervised term-category feature weighting for improved text classification by Attieh, Joseph

    Published 2022
    “…It consists of a supervised weighting scheme defined based on a variant of the TF-ICF (Term Frequency-Inverse Category Frequency) model, embedded into three new lean classification approaches: (i) IterativeAdditive (flat), (ii) GradientDescentANN (1-layered), and (iii) FeedForwardANN (2-layered). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 118
  19. 119

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
  20. 120

    Multigrid solvers in reconfigurable hardware by Haraty, Ramzi A.

    Published 2008
    “…Yet, most efforts fail in this respect due to many factors (time, resources) governed by software implementations. In this paper, we present a hardware implementation of the V-cycle Multigrid method for finding the solution of a 2D-Poisson equation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article