Search alternatives:
using algorithms » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
Showing 641 - 660 results of 717 for search '(( data using algorithms ) OR ((( develop rd algorithm ) OR ( element method algorithm ))))', query time: 0.11s Refine Results
  1. 641

    Exploring Digital Competitiveness through Bayesian Belief Networks by Qazi, Abroon

    Published 2025
    “…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …”
    Get full text
    article
  2. 642

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article
  3. 643

    Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment by Safak Bayram (16925975)

    Published 2022
    “…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. …”
  4. 644

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
  5. 645
  6. 646

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…Since the manipulator speed is limited by the mechanical constraints of the robot arm, the system's throughout should be optimized for generation of the required control law based on the data received from the robot's position sensors. …”
    Get full text
    Get full text
    article
  7. 647

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care by Barry Solaiman (19160614)

    Published 2024
    “…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …”
  8. 648

    Generic metadata representation framework for social-based event detection, description, and linkage by Abebe, Minale A.

    Published 2020
    “…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 649

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
    Get full text
    Get full text
    Get full text
    article
  10. 650

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …”
  11. 651

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    masterThesis
  12. 652
  13. 653
  14. 654

    A forward-backward Kalman for the estimation of time-variant channels in OFDM by Al-Naffouri, T.Y.

    Published 2005
    “…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
    Get full text
    Get full text
    article
  15. 655

    Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method by Mohamed Massaoudi (16888710)

    Published 2021
    “…The hyper-parameters of the proposed stacking ensemble are carefully tuned using the tree-structured of parzen estimators algorithm to achieve top-notch predictive performance. …”
  16. 656
  17. 657

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  18. 658

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 659

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip by El-Maleh, Aiman H.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
    Get full text
    article
  20. 660

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article