يعرض 361 - 380 نتائج من 501 نتيجة بحث عن '(( elements method algorithm ) OR ((( data finding algorithm ) OR ( designed using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 361

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 362
  3. 363

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation حسب Saqr Khalil Saeed Thabet (19517560)

    منشور في 2022
    "…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …"
  4. 364

    A novel technique for fast multiplication حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper we present the design of a new high-speed multiplication unit. The design is based on non-overlapped scanning of 3-bit ® elds of the multiplier. …"
    احصل على النص الكامل
    article
  5. 365

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis حسب Jithin Kalathikudiyil Sreedharan (18268894)

    منشور في 2024
    "…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …"
  6. 366

    Competitive learning/reflected residual vector quantization for coding angiogram images حسب Mourn, W.A.H.

    منشور في 2003
    "…This paper deals with employing competitive learning neural network in RRVQ design algorithm that results in competitive learning RRVQ algorithm for the RVQ structure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 367

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 368

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…Statistical analysis showed that the selected features for liquids' and pipe's properties using the BGWOPSO algorithm were adequate to attain superior performance for both models. …"
  9. 369

    A simulated annealing-based optimal controller for a three phase induction motor حسب Mantawy, A.H.

    منشور في 2002
    "…This paper presents a new approach for optimal controller design of a three-phase induction motor (IM), based on using the simulated annealing (SA) method to find the optimal controller gains that satisfy a specific performance criterion. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 370

    A novel technique for fast multiplication حسب Sait, Sadiq M.

    منشور في 1995
    "…In this algorithm the partial products of the multiplicand and three bits of the multiplier are pre-calculated using only hardwired shifts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 371
  12. 372

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  13. 373
  14. 374

    Efficient unified Montgomery inversion with multi-bit shifting حسب Savas, Erkay

    منشور في 2005
    "…The similarity of the two algorithms allows the design of a single unified hardware architecture that performs the computation of inversion in both fields. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 375

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 376

    An evolutionary approach to load balancing parallel computations حسب Mansour, Nashat

    منشور في 1991
    "…It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 377

    Timing influenced general-cell genetic floorplanner حسب Sait, Sadiq M.

    منشور في 2020
    "…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 378

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits حسب Hind Almerekhi (7434776)

    منشور في 2022
    "…Therefore, in this study, we find the turning points (i.e., toxicity triggers) making conversations toxic. …"
  19. 379

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations حسب Gutub, Adnan

    منشور في 2007
    "…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 380