Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 541 - 560 results of 728 for search '(( element method algorithm ) OR ((( data processing algorithm ) OR ( based method algorithm ))))*', query time: 0.11s Refine Results
  1. 541
  2. 542

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. …”
    Get full text
    Get full text
    Get full text
  3. 543
  4. 544

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  5. 545
  6. 546
  7. 547

    Evolutionary support vector regression for monitoring Poisson profiles by Ali Yeganeh (16624998)

    Published 2023
    “…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. The new method is quicker in detecting out-of-control signals as compared to conventional statistical methods. …”
  8. 548

    Adaptive Chip-Level Channel Estimation for IMT-DS System: DL and UL by SHEIKH, ASRAR

    Published 2005
    “…Anovel despreader-respreader based channel estimator has been proposed to obtain uplink channel estimates at chip level which resolves the deficiencies of conventional methods. …”
    Get full text
    article
  9. 549

    Design of a vibration absorber for harmonically forced damped systems by Issa, Jimmy

    Published 2013
    “…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 550

    Direct sensitivity analysis of nonlinear distortion in RF circuits using multidimensional moments by Tannir, Dani

    Published 2014
    “…In this paper, we show how the moments method can also be used to perform an efficient and accurate sensitivity analysis through the computation of the expansions of the moment vectors with respect to a circuit parameter, i.e., the multidimensional moments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 551

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 552
  13. 553

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  14. 554

    A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems by El Khoury, Elie

    Published 2022
    “…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 555

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…In this paper, we are addressing (1) the problem of one way authentication that leads to the man-in-the-middle attack and (2) the vulnerability pertaining to the password update method of SNMPv3. We propose to use certification authority for two-way authentication and Diffie-Hellman algorithm for key exchange to mitigate the impacts of these problems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 556

    Mitigating Motion Sickness in Autonomous Vehicles for Improved Passenger Comfort by Wadi, Ali

    Published 2024
    “…This work investigates a method to mediate the onset of Motion Sickness (MS) in passenger autonomous vehicles. …”
    Get full text
    article
  17. 557
  18. 558

    A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions by Chakarajamula Hussaian Basha (21633167)

    Published 2024
    “…Based on the simulative comparison results, it has been observed that the modified Grey Wolf Optimization based ANFIS hybrid MPPT method provides good results when equated with the other power point tracking techniques. …”
  19. 559

    Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning by MEZAHEM, FATEMA HAMAD

    Published 2022
    “…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …”
    Get full text
  20. 560

    Protein structure prediction in the 3D HP model by Abu-Khzam, Faisal

    Published 2009
    “…In this paper, we present a Particle Swarm Optimization (PSO) based algorithm for predicting protein structures in the 3D HP model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject