Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
would algorithm » mould algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
would algorithm » mould algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
1
An Adapted Load-Balancing implementation for Sharded Blockchains
Published 2024Get full text
Get full text
Get full text
masterThesis -
2
-
3
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
4
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
5
-
6
-
7
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
8
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
9
-
10
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
-
11
-
12
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
Published 2014“…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
14
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”
-
15
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. Genetic Algorithm would be used to optimize the performance of the system.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
16
Optimizing clopidogrel dose response
Published 2016“…To get a therapeutic effect and avoid adverse drug reactions, therapeutic dose of 75 mg clopidogrel, for example, should be lowered to 6 mg or increased to 215 mg in patients with different genotypes. Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
Get full text
Get full text
Get full text
Get full text
article -
17
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…In this paper, we propose a modification of RSA from the domain of integers to the domain of Gaussian arithmetic to be applied to the first function of SSL that would give more secure communication. This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
18
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
Get full text
-
19
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
Get full text
article -
20
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis