Showing 21 - 40 results of 48 for search '(( complement ii algorithm ) OR ((( second making algorithm ) OR ( neural coding algorithm ))))', query time: 0.12s Refine Results
  1. 21
  2. 22

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 1995
    “…These partial products are then added using a tree of carry-save-adders, and finally the sum and carry vectors are added using a carry-look-ahead adder. In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. …”
    Get full text
    Get full text
    article
  3. 23

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…This structure contains a large number of naturally-ordered cliques that are present in the association graph’s complement. A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 24

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
    Get full text
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29

    Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier by Abhishek Raj (7245425)

    Published 2025
    “…Additionally, the computational efficiency of the algorithm is evidenced by an average processing time of 0.0764 seconds per fault event, making it well-suited for real-time applications.…”
  10. 30
  11. 31

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 32
  13. 33

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
  14. 34

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The second scheme based on a modular learning stretegy consisting of three functional blocks, takes into account the nonstationary character of the ultrasonic NDE system and makes use of the " information preserving rule" which allows accurate and reliable classification procedure. …”
    Get full text
    masterThesis
  15. 35

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care by Barry Solaiman (19160614)

    Published 2024
    “…First, the threat that AI poses to the autonomy of residents can undermine their core needs. Second, how discrimination and bias in algorithmic decision-making can undermine Medicare coverage for PA-LTC, causing doctors' recommendations to be ignored and denying residents the care they are entitled to. …”
  16. 36

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations by Md Mosarrof Hossen (21399056)

    Published 2025
    “…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …”
  17. 37

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 38

    Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review by Loay A. Salman (14150322)

    Published 2023
    “…</p><h3>Conclusion</h3><p dir="ltr">This study demonstrated the potential of AI as a valuable complement for planning TKA, exhibiting a satisfactory level of reliability in predicting TKA implant sizes. …”
  19. 39
  20. 40

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”