Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
Showing 61 - 80 results of 103 for search '(( elements network algorithm ) OR ((( data encoding algorithm ) OR ( based mapping algorithm ))))', query time: 0.22s Refine Results
  1. 61

    Parallel processing by Mansour, Nashat

    Published 2005
    “…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 62

    Competitive learning/reflected residual vector quantization for coding angiogram images by Mourn, W.A.H.

    Published 2003
    “…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
    Get full text
    Get full text
    article
  3. 63

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Residual vector quantization (RVQ) is a vector quantization (VQ) paradigm which imposes structural constraints on the encoder in order to reduce the encoding search burden and memory storage requirements of an unconstrained VQ. …”
    Get full text
    Get full text
    article
  4. 64

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  5. 65

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…In this work, we propose a novel multiple network alignment algorithm based on a context-sensitive random walk model. …”
  6. 66

    Contingency analysis of bulk power system using neural networks by Maghrabi, H.

    Published 1998
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  7. 67

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  8. 68

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 69
  10. 70

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
    Get full text
    article
  11. 71

    Multidimensional Gains for Stochastic Approximation by Saab, Samer S.

    Published 2019
    “…Necessary and sufficient conditions for M≥ N algorithms are presented pertaining to algorithm stability and convergence of the estimate error covariance matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 72

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …”
  13. 73

    Fast Methods Fbr Split Codebooks by Elshafei-Ahmed, M

    Published 2020
    “…The paper presents algorithms for the generation of the SFC mapping utilizing the self-replication feature of the curves, and a number of simulation experiments to demonstrate the effectiveness of the method. …”
    Get full text
    article
  14. 74

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) by Al-Sukairi, Abdallah

    Published 2020
    “…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
    Get full text
    article
  15. 75
  16. 76

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip by El-Maleh, Aiman H.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
    Get full text
    article
  17. 77

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  18. 78
  19. 79

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
  20. 80

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”