Showing 1 - 20 results of 39 for search '(((( implementing context algorithm ) OR ( element rd algorithm ))) OR ( level coding algorithm ))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  4. 4

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  5. 5
  6. 6

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  7. 7

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
  8. 8
  9. 9

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  10. 10
  11. 11
  12. 12

    Correlation Clustering via s-Club Cluster Edge Deletion by Makarem, Norma

    Published 2023
    “…In addition, we implement this 3CCED algorithm in the heuristic approach and compare the experiments to Cluster Editing and 2CCED. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 13
  14. 14

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  15. 15
  16. 16
  17. 17

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  18. 18

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems by Tabbara, Mazen R.

    Published 2017
    “…In certain penetration events the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 19
  20. 20

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
    Get full text