Showing 241 - 260 results of 639 for search '(( element data algorithm ) OR ((( data learning algorithm ) OR ( designed using algorithm ))))', query time: 0.12s Refine Results
  1. 241
  2. 242

    Digital circuit design through simulated evolution (SimE) by Sait, Sadiq M.

    Published 2003
    “…In this paper, the use of simulated evolution (SimE) algorithm in the design of digital logic circuits is proposed. …”
    Get full text
    Get full text
    article
  3. 243

    A quantum algorithm for evolving open quantum dynamics on quantum computing devices by Zixuan Hu (13719685)

    Published 2020
    “…<p dir="ltr">Designing quantum algorithms for simulating quantum systems has seen enormous progress, yet few studies have been done to develop quantum algorithms for open quantum dynamics despite its importance in modeling the system-environment interaction found in most realistic physical models. …”
  4. 244
  5. 245
  6. 246

    Design of a vibration absorber for harmonically forced damped systems by Issa, Jimmy

    Published 2013
    “…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 247

    Power system output feedback stabilizer design via geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …”
    Get full text
    Get full text
    article
  8. 248

    Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography by Muhammad Ali Akbar (16875915)

    Published 2024
    “…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …”
  9. 249
  10. 250
  11. 251

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
  12. 252

    Humanizing AI in medical training: ethical framework for responsible design by Mohammed Tahri Sqalli (18420840)

    Published 2023
    “…Humanizing AI in medical training is crucial to ensure that the design and deployment of its algorithms align with ethical principles and promote equitable healthcare outcomes for both medical practitioners trainees and patients. …”
  13. 253
  14. 254
  15. 255

    Recursive least-squares backpropagation algorithm for stop-and-go decision-directed blind equalization by Abrar, Shafayat

    Published 2002
    “…To overcome this problem, in this work, a fast converging recursive least squares (RLS)-based complex-valued backpropagation learning algorithm is derived for S&G-DD blind equalization. …”
    Get full text
    Get full text
    article
  16. 256

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 257

    Using machine learning for disease detection. (c2013) by Jreij, Georges Antoun

    Published 2016
    “…Classification consists of predicting group membership for new data instances by learning from pre-classified data instances. …”
    Get full text
    Get full text
    masterThesis
  18. 258
  19. 259

    A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption by Azadeh, Ali

    Published 2019
    “…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 260