Showing 1 - 20 results of 315 for search '(((( implement ii algorithm ) OR ( relevant data algorithm ))) OR ( level coding algorithm ))', query time: 0.16s Refine Results
  1. 1
  2. 2

    A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation by Siddiqi, Umair F.

    Published 2020
    “…Keywords: (1) Inverse Halftoning (2) Hardware Implementation (3) Look-Up Table Inverse Halftoning (4) Complex Programmable Logic Devices (CPLD) (5) Image Processing…”
    Get full text
    article
  3. 3

    Variable Selection in Data Analysis: A Synthetic Data Toolkit by Mitra, Rohan

    Published 2024
    “…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
    Get full text
    article
  4. 4
  5. 5

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  6. 6

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  7. 7
  8. 8

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
  9. 9

    Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant by Shahbaz Hussain (9765320)

    Published 2019
    “…Practical constraints such as generator limits and power balance were considered. Two contemporary metaheuristic techniques, particle swarm optimization (PSO) and genetic algorithm (GA), have were simultaneously implemented for combined economic emission dispatch (CEED) of an independent power plant (IPP) situated in Pakistan for different load demands. …”
  10. 10
  11. 11
  12. 12

    Auto-indexing Arabic texts based on association rule data mining. (c2015) by Rouba G. Nasrallah

    Published 2015
    “…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. …”
    Get full text
    Get full text
    masterThesis
  13. 13
  14. 14
  15. 15

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) by Gutub, Adnan

    Published 2002
    “…We also propose a scalable and unified architecture for a Montgomery inverse hardware that operates in both GF(p) and GF(2n) fields. We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …”
    Get full text
    Get full text
    masterThesis
  16. 16

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…The proposed model was developed and implemented using MATLAB software. A Pareto front was derived from the MOGA by employing the T2FNN within the process, identifying fourteen optimal solutions.…”
  17. 17
  18. 18

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 19

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 20

    EFFICIENT ALGORITHM FOR WEINBERGER ARRAY FOLDING by Sait, Sadiq M.

    Published 2020
    “…Weinberger arrays (WAs) are an alternative to progammable logic arrays (PLAs) as a method of implementing combinatorial logic circuits. Column folding is a technique generally employed in PLAs to save the silicon area by implementing the circuit of two column in the area of one. …”
    Get full text
    article