Showing 241 - 260 results of 312 for search '(((( implement modeling algorithm ) OR ( movement data algorithm ))) OR ( data making algorithm ))', query time: 0.11s Refine Results
  1. 241

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  2. 242
  3. 243

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 2020
    “…In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithm is modelled in a hardware description language and its VLSI chip implemented. …”
    Get full text
    article
  4. 244

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  5. 245

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
  6. 246

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…To accomplish such a feat, four user-specific methods were developed, implemented, and tested; all of which were based on a benchmark database created by the authors. …”
  7. 247

    Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan by Duffuaa, S. O.

    Published 2020
    “…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
    Get full text
    article
  8. 248
  9. 249

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 250
  11. 251

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 1995
    “…In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithms is modeled in a hardware description language and its VLSI chip implemented. …”
    Get full text
    Get full text
    article
  12. 252

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…This paper applies artificial neural networks to forecast gasoline consumption. The ANN is implemented using the cross entropy error function in the training stage. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 253

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. …”
    Get full text
    article
  14. 254
  15. 255

    A machine learning approach for localization in cellular environments by Abdallah, Ali A.

    Published 2018
    “…This constitutes an improvement of 41%, 45%, and 16%, respectively, over the WKNN-only algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 256

    Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review by Mershad, Khaleel

    Published 2023
    “…More precisely, we identify five areas within the “lightweight” concept, namely, blockchain architecture, device authentication, cryptography model, consensus algorithm, and storage method. We discuss the various methods employed in each “lightweight” category, highlighting existing gaps and identifying areas for improvement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 257

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks by Abbas, Nadine

    Published 2015
    “…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 258

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”
  19. 259

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
  20. 260

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…Smart contracts will be used to register developers, create blocks, and manage the repository. The suggested model is implemented using the Hyperledger Fabric network, and the developer and authorizer ends are built into the dotnet web application.…”