Showing 1 - 20 results of 41 for search '(((( implementing would algorithm ) OR ( element could algorithm ))) OR ( level coding algorithm ))', query time: 0.17s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  5. 5
  6. 6
  7. 7

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  8. 8

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  9. 9
  10. 10

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs by Tarsissi, Lama

    Published 2021
    “…Further studies could also include strategies for the identification and reconstruction of those new sequences and hypergraphs.…”
    Get full text
  11. 11

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  12. 12
  13. 13

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
  14. 14

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. Genetic Algorithm would be used to optimize the performance of the system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15
  16. 16

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…To get a therapeutic effect and avoid adverse drug reactions, therapeutic dose of 75 mg clopidogrel, for example, should be lowered to 6 mg or increased to 215 mg in patients with different genotypes. Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 17

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 18

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…In this paper, we propose a modification of RSA from the domain of integers to the domain of Gaussian arithmetic to be applied to the first function of SSL that would give more secure communication. This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 19

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  20. 20

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article