Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
-
581
Query acceleration in distributed database systems
Published 2001“…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …”
Get full text
Get full text
Get full text
article -
582
Three approaches to modelling heating and evaporation of monocomponent droplets
Published 2024“…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”
-
583
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
Published 2023“…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …”
Get full text
Get full text
Get full text
article -
584
EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING
Published 2020“…In this paper we employ two iterative heuristics for the optimization of VLSI Netlist Bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) [sadiq et al., 1999] respectively. …”
Get full text
article -
585
A novel few shot learning derived architecture for long-term HbA1c prediction
Published 2024“…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …”
-
586
Cross entropy error function in neural networks
Published 2002“…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
Get full text
Get full text
Get full text
conferenceObject -
587
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
588
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
Get full text
Get full text
article -
589
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
Published 2006“…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …”
Get full text
Get full text
article -
590
-
591
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
592
General iterative heuristics for VLSI multiobjective partitioning
Published 2003“…In this paper, we engineer two iterative heuristics for the optimization of VLSI netlist bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
Get full text
Get full text
article -
593
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
Get full text
article -
594
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…There have been great improvements in web technology over the past years which heavily loaded the Internet with various digital contents of different fields. This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
Get full text
-
595
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
596
Design and development of an embedded controller for roboticmanipulator
Published 1998“…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
Get full text
Get full text
article -
597
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
598
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
599
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
600
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
Get full text
article