Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 301 - 320 results of 622 for search '(( elements method algorithm ) OR ((( task scheduling algorithm ) OR ( problem using algorithm ))))', query time: 0.12s Refine Results
  1. 301

    The use of configurable computing for computational kernels in scientific simulations by Jones, Mark

    Published 2006
    “…We present algorithms and analysis for two such kernels: fast, problem-specific multipliers and the efficient evaluation of Taylor series. …”
    Get full text
    Get full text
    Get full text
    article
  2. 302

    Plant disease detection using drones in precision agriculture by Ruben Chin (17725986)

    Published 2023
    “…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
  3. 303
  4. 304

    Fuzzy controllers design using space-filling curves by Elshafei-Ahmed, M.

    Published 1998
    “…The SFC fuzzy model is then used to design a fuzzy controller. The proposed method achieves a dramatic reduction of the complexity of fuzzy controller by reducing the multivariable fuzzification problem to a one dimensional space…”
    Get full text
    Get full text
    article
  5. 305

    Fuzzy Controllers Design Using Space-Filling Curves by Elshafei-Ahmed, M

    Published 2020
    “…The SFC fuzzy model is then used to design a fuzzy controller. The proposed method achieves a dramatic reduction of the complexity of fuzzy controller by reducing the multivariable fuzzification problem to a one dimentional space.…”
    Get full text
    article
  6. 306

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  7. 307
  8. 308

    A METHODOLOGY FOR NETWORK TOPOLOGY DESIGN USING FUZZY EVALUATIONS by Khan, Salman A.

    Published 2020
    “…This methodology is based on two algorithms, namely, fuzzy simulated evolution algorithm and the augmenting path algorithm. …”
    Get full text
    article
  9. 309
  10. 310

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…Scheduling and allocation can be formulated as an optimization problem. In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. …”
    Get full text
    article
  11. 311
  12. 312

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…The use of RSSI has proven to be a cheap solution to the Localization problem since no additional hardware is required, other than the receiver itself. …”
    Get full text
    Get full text
    masterThesis
  13. 313
  14. 314

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
  15. 315

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS-A proposes a dynamic algorithm to compute the exact time for nodes cleansing states and restricts the exposure window of the nodes. …”
  16. 316
  17. 317
  18. 318
  19. 319

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…This research aims to analyze the reliability and efficiency of data mining techniques in detecting and preventing fraud in the procurement sector in the UAE and globally. The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  20. 320