Showing 221 - 240 results of 273 for search '(((( implement ii algorithm ) OR ( elementary learning algorithm ))) OR ( level coding algorithm ))', query time: 0.13s Refine Results
  1. 221

    MSLP: mRNA subcellular localization predictor based on machine learning techniques by Saleh Musleh (15279190)

    Published 2023
    “…</p><h3>Availability</h3><p dir="ltr">We have implemented a Docker container and API for end users to run their sequences on our model. …”
  2. 222

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
  3. 223
  4. 224
  5. 225

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  6. 226
  7. 227
  8. 228

    Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system by Ali Farhat (1461478)

    Published 2018
    “…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …”
  9. 229

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  10. 230

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  11. 231
  12. 232

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  13. 233

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …”
  14. 234

    Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain by Farshad Rahimi Ghashghaei (20880995)

    Published 2025
    “…We comprehensively analyse the proposed ensemble learning, including algorithmic details, implementation specifics, and experimental results. …”
  15. 235

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …”
  16. 236

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  17. 237

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  18. 238

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  19. 239

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
    Get full text
    Get full text
    Get full text
    article
  20. 240

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”