Search alternatives:
using algorithm » cosine algorithm (Expand Search)
two algorithms » _ algorithms (Expand Search)
Showing 621 - 640 results of 901 for search '(( data using algorithm ) OR ((( develop two algorithms ) OR ( elements network algorithm ))))', query time: 0.13s Refine Results
  1. 621

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 622

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
  3. 623

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling by Peixoto, Eduardo

    Published 2014
    “…Then, two types of mode mapping algorithms are proposed. …”
    Get full text
    article
  4. 624

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …”
  5. 625

    Three approaches to modelling heating and evaporation of monocomponent droplets by Dmitrii V. Antonov (21225041)

    Published 2024
    “…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”
  6. 626

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …”
    Get full text
    Get full text
    Get full text
    article
  7. 627
  8. 628

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 629

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
  10. 630

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  11. 631

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article
  12. 632

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
  13. 633

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 634

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  15. 635
  16. 636

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
    Get full text
    Get full text
    Get full text
    article
  17. 637

    A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making by Sachin Jain (19161721)

    Published 2024
    “…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
  18. 638

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  19. 639
  20. 640

    On the complexity of bilinear computations by Takche, Jean Halim

    Published 1984
    “…One problem of interest in arithmetic complexity is the direct sum conjecture due to Strassen. Given two disjoint bilinear problems S(,1) and S(,2), Strassen conjectured that we can optimally compute their direct sum S(,1) (CRPLUS) S(,2) by optimally computing S(,1) and S(,2) separately. …”
    Get full text
    Get full text
    Get full text
    masterThesis