Search alternatives:
method algorithm » mould algorithm (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
Showing 1 - 20 results of 524 for search '(( elements method algorithm ) OR ((( data based algorithm ) OR ( radar tracking algorithm ))))', query time: 0.14s Refine Results
  1. 1

    Radar Pulse Interleaving For Multi-Target Tracking by Elshafei, M.

    Published 2020
    “…Interleaving algorithms developed to operate radars exploit the dead-times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. …”
    Get full text
    article
  2. 2
  3. 3
  4. 4

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
    Get full text
  5. 5
  6. 6
  7. 7

    Web Based Online Hybrid Teaching Method of Network Music Course by Abu Zitar, Raed

    Published 2022
    “…Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
    Get full text
  8. 8

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  9. 9

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
    Get full text
  10. 10
  11. 11
  12. 12

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem by Abu Zitar, Raed

    Published 2023
    “…In many cases, several radars are collectively used to track drones efficiently, generating measurements and several tracks under different circumstances. …”
    Get full text
  13. 13
  14. 14
  15. 15

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems by Boukhari, Bahia

    Published 2019
    “…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 16
  17. 17
  18. 18

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
    Get full text
    Get full text
    Get full text
    article
  19. 19

    Data reductions and combinatorial bounds for improved approximation algorithms by Abu-Khzam, Faisal N.

    Published 2016
    “…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 20

    Allocating data to distributed-memory multiprocessors by genetic algorithms by Mansour, Nashat

    Published 2016
    “…We present three genetic algorithms (GAs) for allocating irregular data sets to multiprocessors. …”
    Get full text
    Get full text
    Get full text
    article