Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 248 for search '(( element method algorithm ) OR ((( data testing algorithm ) OR ( task scheduling algorithm ))))', query time: 0.10s Refine Results
  1. 161

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  2. 162

    Dataset built for Arabic Sentiment Analysis by AL MUKHAITI, AYESHA JUMAA SALEM

    Published 2016
    “…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
    Get full text
  3. 163

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
    Get full text
    Get full text
    Get full text
  4. 164

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures by Ouaiss, Iyad

    Published 2017
    “…The SPARCS system accepts design specifications at the behavior level, in the form of task graphs. The system contains a temporal partitioning tool to temporally divide and schedule the tasks on the reconfigurable architecture, a spatial partitioning tool to map the tasks to individual FPGAs, and a high-level synthesis tool to synthesize efficient register-transfer level designs for each set of tasks destined to be downloaded on each FPGA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 165
  6. 166
  7. 167

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…<p dir="ltr">The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of human beings from scheduling daily activities to personalized shopping recommendations. …”
  8. 168
  9. 169

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…A case study using real population and transportation network data was tested using the proposed methodology. The results show that the city is in grave danger due to the high population density and disproportionate network capacity.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 170

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  11. 171

    VEGAWES: variational segmentation on whole exome sequencing for copy number detection by Samreen Anjum (19651882)

    Published 2015
    “…We tested this algorithm on synthetic data and 100 Glioblastoma Multiforme primary tumor samples. …”
  12. 172

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…The effect of surface area loading rate (SALR), organic matters (OMs), nutrients (N & P), feed flow rate (Q<sub>feed</sub>), hydraulic retention time (HRT), and internal recycle flow (IRF) on the performance of the ENR-BP to fulfil rigorous discharge limitations were evaluated. Experimental data was used to develop the appropriate architecture for the AAN using iterative steps of training and testing. …”
  13. 173

    Communications in electronic textile systems by Nakad, Z.

    Published 2017
    “…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 174
  15. 175

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
  16. 176
  17. 177

    Generic DFT approach for pattern sensitive faults in word-orientedmemories by Amin, A.A.

    Published 1996
    “…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
    Get full text
    Get full text
    article
  18. 178

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. …”
  19. 179
  20. 180

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”