Search alternatives:
making algorithm » cosine algorithm (Expand Search)
implementing rd » implementing iot (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
models using » model using (Expand Search)
Showing 621 - 640 results of 737 for search '(((( implementing rd algorithm ) OR ( elements making algorithm ))) OR ( models using algorithm ))', query time: 0.12s Refine Results
  1. 621

    Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor by Gutub, Adnan

    Published 2007
    “…This multiplier hardware is furthermore adjusted to have area flexibility feature, which is used as the basic block in modeling a complete projective coordinate GF(2k) ECC coprocessor.…”
    Get full text
    Get full text
    article
  2. 622
  3. 623

    Multi-Objective Optimization for Food Availability under Economic and Environmental Risk Constraints by Bashar Hassna (19170940)

    Published 2024
    “…Utilizing these assessments, a multi-objective optimization model is developed and solved using MATLAB (R2018a)’s Genetic Algorithm, aiming to identify optimal suppliers to meet Qatar’s food demand, with consideration of the economic, environmental, and risk factors. …”
  4. 624
  5. 625

    Creating and detecting fake reviews of online products by Joni Salminen (7434770)

    Published 2022
    “…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. …”
  6. 626

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …”
  7. 627

    Parallel processing by Mansour, Nashat

    Published 2005
    “…The parallel genetic algorithm is based on a model of natural evolution. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 628

    A Novel Centrality-Based Approach for Link Prediction by El Khoury, Elissa Lichaa

    Published 2025
    “…Namely, we consider weighted betweenness, closeness and Katz centralities, in addition to the Resource Allocation and Adamic-Adar indices. We also use a genetic algorithm to optimize the weights of these metrics, reflecting their contributions to link prediction. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 629

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
  10. 630
  11. 631
  12. 632

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls by SANAD, AYMAN ADEL AHMED

    Published 2025
    “…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …”
    Get full text
  13. 633

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…The main goals consist of creating an AI-based framework to monitor and analyze student interactions, evaluating the influence of online learning platforms on student understanding using advanced algorithms, and determining the most efficient methods for blended learning systems. …”
  14. 634

    Control of cardiac alternans by mechanical and electrical feedback by Yapari, Felicia

    Published 2014
    “…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …”
    Get full text
    article
  15. 635

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization by De Rochechouart, Maxence

    Published 2023
    “…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
    Get full text
  16. 636
  17. 637

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose by Atiq Ur Rehman (8843024)

    Published 2020
    “…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …”
  18. 638

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 639
  20. 640

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
    Get full text
    Get full text
    Get full text
    conferenceObject