Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
241
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
242
-
243
A novel technique for fast multiplication
Published 2020“…In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithm is modelled in a hardware description language and its VLSI chip implemented. …”
Get full text
article -
244
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
245
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
-
246
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…To accomplish such a feat, four user-specific methods were developed, implemented, and tested; all of which were based on a benchmark database created by the authors. …”
-
247
Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan
Published 2020“…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
Get full text
article -
248
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
249
CEAP
Published 2016“…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
Get full text
Get full text
Get full text
Get full text
article -
250
Mobile Energy Storage Systems for Benefit Maximization in Resilient Smart Grids
Published 2025Get full text
doctoralThesis -
251
A novel technique for fast multiplication
Published 1995“…In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithms is modeled in a hardware description language and its VLSI chip implemented. …”
Get full text
Get full text
article -
252
Cross entropy error function in neural networks
Published 2002“…This paper applies artificial neural networks to forecast gasoline consumption. The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
253
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. …”
Get full text
article -
254
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
255
A machine learning approach for localization in cellular environments
Published 2018“…This constitutes an improvement of 41%, 45%, and 16%, respectively, over the WKNN-only algorithm.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
256
Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review
Published 2023“…More precisely, we identify five areas within the “lightweight” concept, namely, blockchain architecture, device authentication, cryptography model, consensus algorithm, and storage method. We discuss the various methods employed in each “lightweight” category, highlighting existing gaps and identifying areas for improvement. …”
Get full text
Get full text
Get full text
Get full text
article -
257
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
Published 2015“…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
258
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”
-
259
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
260
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…Smart contracts will be used to register developers, create blocks, and manage the repository. The suggested model is implemented using the Hyperledger Fabric network, and the developer and authorizer ends are built into the dotnet web application.…”