Search alternatives:
processing algorithm » processing algorithms (Expand Search)
working algorithms » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 101 - 120 results of 461 for search '(( elements method algorithm ) OR ((( data working algorithms ) OR ( data processing algorithm ))))', query time: 0.26s Refine Results
  1. 101
  2. 102

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  3. 103

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The novel LSTM time series algorithm proved to work best for demand forecasting. …”
    Get full text
  4. 104

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 105
  6. 106

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  7. 107
  8. 108
  9. 109
  10. 110
  11. 111

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark by Ameema Zainab (16864263)

    Published 2021
    “…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116
  17. 117

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  18. 118
  19. 119

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
  20. 120

    Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis by Sami Elzeiny (16891521)

    Published 2021
    “…In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”