Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
te algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
element te » elementi per (Expand Search)
implementing » implemented (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
te algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
element te » elementi per (Expand Search)
implementing » implemented (Expand Search)
-
141
A novel technique for fast multiplication
Published 1995“…In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithms is modeled in a hardware description language and its VLSI chip implemented. …”
Get full text
Get full text
article -
142
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
Published 2021“…Most of the studies used data sets with a size of <10,000 samples (32/47, 68%). Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). …”
-
143
-
144
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
145
Cross entropy error function in neural networks
Published 2002“…The second model is a trivariate model based on GC, price and car registration time series. …”
Get full text
Get full text
Get full text
conferenceObject -
146
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
Get full text
-
147
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. …”
Get full text
article -
148
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
149
A machine learning approach for localization in cellular environments
Published 2018“…This constitutes an improvement of 41%, 45%, and 16%, respectively, over the WKNN-only algorithm.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
150
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
Published 2015“…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
151
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”
-
152
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
153
-
154
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
155
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
156
An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study
Published 2022“…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …”
-
157
Evolutionary support vector regression for monitoring Poisson profiles
Published 2023“…Little attention has been given to profile monitoring with non-normal response variables, known as general linear models which consists of two main categories (i.e., logistic and Poisson profiles). …”
-
158
Combined cycle gas turbine system optimization for extended range electric vehicles
Published 2020“…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …”
Get full text
Get full text
Get full text
Get full text
article -
159
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
160