Showing 21 - 40 results of 65 for search '(((( implementing change algorithm ) OR ( element per algorithm ))) OR ( level coding algorithm ))', query time: 0.11s Refine Results
  1. 21

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 22

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes by Wadi, Ali

    Published 2019
    “…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …”
    Get full text
    article
  3. 23

    Multidimensional Gains for Stochastic Approximation by Saab, Samer S.

    Published 2019
    “…The proposed algorithms here aim for per-iteration minimization of the mean square estimate error. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 24

    A new fuzzy logic controller based IPM synchronous motor drive by Abido, M.A.

    Published 2003
    “…The proposed FLC is designed to have less computational burden, which makes it suitable for online implementation. The FLC parameters are optimized by genetic algorithm. …”
    Get full text
    Get full text
    article
  5. 25

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  6. 26
  7. 27
  8. 28

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  9. 29

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  10. 30

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  11. 31
  12. 32

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  13. 33

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  14. 34
  15. 35

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes by Wadi, Ali

    Published 2019
    “…Drug release is experimentally measured as a change in fluorescence upon the application of ultrasound. …”
    Get full text
    article
  16. 36

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
  17. 37

    Evolutionary support vector regression for monitoring Poisson profiles by Ali Yeganeh (16624998)

    Published 2023
    “…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. The new method is quicker in detecting out-of-control signals as compared to conventional statistical methods. …”
  18. 38

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  19. 39

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. A characteristic feature of this method is that, with small changes in the code, a wide spectrum of problems can be treated. …”
    Get full text
    Get full text
    Get full text
    article
  20. 40

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Insufficient knowledge and understanding of AI, data management and integration issues, legal and regulatory hurdles, financial considerations, reluctance to change, and interoperability issues all hinder AI system adoption and implementation. …”
    Get full text