Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 381 - 400 results of 571 for search '(( elements method algorithm ) OR ((( image processing algorithm ) OR ( based method algorithm ))))', query time: 0.10s Refine Results
  1. 381

    An effective design system for dynamically reconfigurable architectures by Ouaiss, I.

    Published 2017
    “…In this paper, we use the Joint Photographic Experts Group (JPEG) image compression algorithm as a design example to demonstrate the effectiveness of dynamic reconfiguration achieved using SPARCS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 382

    Heat rate curve approximation for power plants without data measuring devices by Poullikkas, Andreas

    Published 2012
    “…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
    Get full text
    article
  3. 383

    Exploring new horizons in neuroscience disease detection through innovative visual signal analysis by Nisreen Said Amer (17984077)

    Published 2024
    “…We introduce the concept of eye-naked classification, which integrates domain-specific knowledge and clinical expertise into the classification process. Our study demonstrates the effectiveness of the FBFT method, achieving impressive accuracies across multiple brain disorders using CNN-based classification. …”
  4. 384

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…The sensors are unbiased radars with fixed locations. The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
    Get full text
  5. 385
  6. 386

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…Deep learning approaches have made significant progress in digital image processing, particularly in object recognition and classification, and are among the most popular computer vision tools. …”
  7. 387

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …”
  8. 388
  9. 389

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…This paper presents an evolutionary method for testing web applications. Although state-based testing has been reported, few papers have addressed modern web applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 390
  11. 391

    A matheuristic approach for solving the 2-connected dominating set problem by Raka Jovanovic (17947838)

    Published 2019
    “…The algorithm is based on a Greedy Randomized Adaptive Search Procedure (GRASP). …”
  12. 392

    On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints by Temadher A. Almaadeed (14151288)

    Published 2022
    “…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …”
  13. 393

    Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves by S. Andhale, Yogesh

    Published 2018
    “…The genetic optimization (GO) method is used to further refine the location of damage within the enclosed area obtained using astroid algorithm. …”
    Get full text
  14. 394

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks by Mohamed Massaoudi (16888710)

    Published 2024
    “…This article introduces an efficient transient stability status prediction method based on deep temporal convolutional networks (TCNs). …”
  15. 395

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 396

    Efficient Scalable VLSI Architecture for Montgomery Inversion in GF(p) by Gutub, Adnan

    Published 2004
    “…We suggest a new correction phase for a previously proposed almost Montgomery inverse algorithm to calculate the inversion in hardware. We also propose an efficient hardware algorithm to compute the inverse by multi-bit shifting method. …”
    Get full text
    Get full text
    article
  17. 397

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis
  18. 398

    Impacts of Feeder Reconfiguration on Renewable Resources Allocation in Balanced and Unbalanced Distribution Systems by Zidan, Aboelsood A.

    Published 2016
    “…In this article, network reconfiguration and distributed generation allocation in distribution networks are dealt with simultaneously while imposing an objective of minimizing energy loss. The proposed method, which is based on a genetic algorithm, takes into consideration the uncertainty related to renewable distributed generation output power and the load variability. …”
    Get full text
    article
  19. 399

    Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems by J. Prasanth Ram (19499062)

    Published 2022
    “…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. For reconfiguration, a simple 5 × 5 PV array is considered, and a new physical relocation procedure based on the position square method is proposed. …”
  20. 400

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”