Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
Showing 481 - 500 results of 615 for search '(( elements mean algorithm ) OR ((( data processing algorithm ) OR ( designed using algorithm ))))', query time: 0.12s Refine Results
  1. 481
  2. 482

    SemIndex: Semantic-Aware Inverted Index by Chbeir, Richard

    Published 2017
    “…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 483
  4. 484
  5. 485

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…This computational framework can expedite and improve the process of finding desirable molecular structures of IL via accurate property predictions in a data-driven manner. …”
  6. 486

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling by Peixoto, Eduardo

    Published 2014
    “…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
    Get full text
    article
  7. 487

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…However, existing studies usually utilize future data during the decomposition process and therefore cannot be appropriately employed for real-world applications, due to the inaccessibility of future data. …”
  8. 488

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 489

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors by Sharaf, Omar Z.

    Published 2016
    “…The separately-series equivalent thermal resistance network technique is employed in the thermal analyses in order to treat two-dimensional steady-state heat transfer in composite structures with different thermal conductivities as one-dimensional without a loss of accuracy. Finally, using the developed design models and simulation algorithms, constrained non-linear multi-variable geometric optimization of the assembly components has been carried out to obtain minimum pumping power, maximum extractor heat transfer coefficient, and maximum thermoelectric power output. …”
    Get full text
    article
  10. 490

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben Romdhane, Haifa

    Published 2023
    “…An integrated approach, featuring the application of advanced image processing techniques and geospatial analysis using machine learning, was adopted to characterise the site while automating the process and investigating its applicability. …”
    Get full text
  11. 491

    An Optimal Approach for Assessing Weibull Parameters and Wind Power Potential for Six Coastal Cities in Pakistan by Ghulam Abbas (764241)

    Published 2024
    “…In this research, we have ameliorated the performance of the recently-introduced novel energy pattern factor method (NEPFM) via a direct search algorithm, i.e., simplex search algorithm (SSA). We designate the resulting algorithm as NEPFM-SSA as it took NEPFM’s Weibull distribution parameters as an initial guess and retuned them with the help of the simplex search algorithm to get updated Weibull distribution parameters, which ensure better fitting characteristics. …”
  12. 492

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…This implementation is modeled using VHDL in a parametrizable manner. Two other parameterized RSA hardware designs have also been VHDL modeled for comparison. …”
    Get full text
    masterThesis
  13. 493

    Timing influenced general-cell genetic floorplanner by Sait, Sadiq M.

    Published 2020
    “…In this paper we present a timing-influenced floorplanner for general cell IC design. The floorplanner works in two phases. In the first phase we use the genetic algorithm and restrict the modules to be rigid and the floorplan to have slicing structure. …”
    Get full text
    article
  14. 494

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…Nonlinear model for the drilling operation was developed using energy balance equation, where rock specific energy is used to calculate the minimum power required for a given rate of penetration. …”
    Get full text
    masterThesis
  15. 495

    A method for efficient mapping and reliable routing for NoC architectures with minimum bandwidth and area by Harmanani, Haidar M.

    Published 2017
    “…Network-on-Chip (NoC) is an on-chip communication methodology that has been proposed as an alternative to bus-based communication in order to cope with the increased complexity in embedded designs. This paper presents a method for assigning tasks to nodes in a 2-D mesh, and for determining the nodes positions on the mesh using simulated annealing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 496

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  17. 497

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis by Ghada Al-Hussain (18295426)

    Published 2022
    “…<h3>Background</h3><p dir="ltr">When investigating voice disorders a series of processes are used when including voice screening and diagnosis. …”
  18. 498

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  19. 499

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…This implementation is modeled using VHDL in a parametrizable manner. Two other parameterized RSA hardware designs have also been VHDL modeled for comparison. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 500

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…Different types of dynamical neural networks are combined according to system operation and emission behavior. Real data from a boiler plant is used to develop the model. …”
    Get full text
    masterThesis