Showing 701 - 720 results of 763 for search '(( data processing algorithm ) OR ((( developing a algorithm ) OR ( elementi deer algorithm ))))', query time: 0.11s Refine Results
  1. 701

    On the complexity of bilinear computations by Takche, Jean Halim

    Published 1984
    “…Arithmetic complexity theory is the study of the minimum number of non-scalar multiplications required to compute a set of bilinear forms. One can show that we can restrict ourselves to bilinear algorithms. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 702

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling by Peixoto, Eduardo

    Published 2014
    “…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
    Get full text
    article
  3. 703

    An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks by Mohammad Zain Ul Abideen (16904637)

    Published 2022
    “…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
  4. 704

    Radar Pulse Interleaving For Multi-Target Tracking by Elshafei, M.

    Published 2020
    “…Interleaving algorithms developed to operate radars exploit the dead-times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. …”
    Get full text
    article
  5. 705
  6. 706

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…The ultimate target is to develop a robust multi-modal machine learning method to predict the optimum geometry (i.e., hexagonal ring angle) and suitable in-plane crushing arrangements of the hexagonal ring system for targeted crashworthiness parameters. …”
  7. 707

    Four quadrant robust quick response optimally efficient inverterfed induction motor drive by Islam, S.M.

    Published 1989
    “…The control algorithms developed are readily implementable with present-day microprocessors…”
    Get full text
    Get full text
    article
  8. 708

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
    Get full text
    Get full text
    Get full text
    article
  9. 709

    Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…</p><h2>Other Information</h2><p dir="ltr">Published in: Frontiers in Bioengineering and Biotechnology<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3389/fbioe.2022.876672" target="_blank">https://dx.doi.org/10.3389/fbioe.2022.876672</a></p>…”
  10. 710

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  11. 711

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…Identifying the minimally invasive biomarkers associated with dementia that could provide insights into the disease pathogenesis, improve early diagnosis, and facilitate the development of effective treatments is pressing. Proteomic studies have emerged as a promising approach for identifying the protein biomarkers associated with dementia. …”
  12. 712
  13. 713

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  14. 714

    Connectionist technique estimates of hydrogen storage capacity on metal hydrides using hybrid GAPSO-LSSVM approach by Sina Maghsoudy (21393539)

    Published 2024
    “…Meanwhile, the estimation of hydrogen storage capacity will accelerate their development procedure. Machine learning algorithms can predict the correlation between the metal hydride chemical composition and its hydrogen storage capacity. …”
  15. 715

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
    Get full text
  16. 716

    Machine Learning Techniques for Pharmaceutical Bioinformatics by SULTAN, AHMED ATTA AHMED

    Published 2018
    “…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
    Get full text
  17. 717

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…These benchmark datasets contain a variety of multivariate IoT attacks. The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
  18. 718
  19. 719

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
    Get full text
    Get full text
    Get full text
    article
  20. 720