Showing 21 - 40 results of 47 for search '(( element research algorithm ) OR ((( data encoding algorithm ) OR ( based binding algorithm ))))*', query time: 0.11s Refine Results
  1. 21
  2. 22

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 23
  4. 24
  5. 25

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip by El-Maleh, Aiman H.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
    Get full text
    article
  6. 26

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  7. 27

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
  8. 28
  9. 29

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Query optimization strategies aim to minimize the cost of transferring data across networks. Many techniques and algorithms have been proposed to optimize queries. …”
    Get full text
    Get full text
    Get full text
    article
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 35

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  16. 36

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  17. 37
  18. 38

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…Besides this, the findings reclaim that “reasons” (for/against) shape to form the attitude of consumers toward voice assistants. The current research offers preliminary evidence with regard to the investigation of voice assistant adoption using the BRT that jointly examines enabling and inhibiting elements leading to consumers’ attitude formation. …”
  19. 39
  20. 40

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”