Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
281
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
282
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
283
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
Published 2014“…A generic tool termed as Fuzzy Inference Engine (FIE) was built to demonstrate the multivariable modular approach used to implement the CRM performance measurement.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
284
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…Qualitative data was gathered from information found in relatively similar studies and from a real estate company in Dubai that allowed this study to be conducted on its databases with the help of its management and staff through interview, discussions, and direct implementations of the tools for testing. …”
Get full text
-
285
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
286
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2008“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
287
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2007“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
288
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2008“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
289
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
290
-
291
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
292
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…Namely, this paper evaluates the perfor mance of sixteen different drift detection methods using three different metrics: accuracy, runtime, and memory usage. To guarantee a fair com parison, MOA is used. Fourteen algorithms are implemented in MOA. …”
Get full text
Get full text
Get full text
-
293
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…We use a Q-learning algorithm to solve the modeled problem. …”
Get full text
Get full text
-
294
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
295
PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT
Published 2023“…In this paper, we propose a chatbot for detecting the students feeling by using machine-learning algorithms. …”
Get full text
Get full text
-
296
-
297
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…However, these methods tend to converge towards local solutions with a low convergence rate. In order to address this issue in GKSO, a more refined version called I-GKSO is implemented. …”
Get full text
-
298
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
299
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
300
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…In addition to building a prediction model to examine if a school will improve in the future TIMSS assessment cycles. …”
Get full text