Search alternatives:
using algorithm » cosine algorithm (Expand Search)
Showing 881 - 900 results of 1,049 for search '(( elements network algorithm ) OR ((( data using algorithm ) OR ( model using algorithm ))))', query time: 0.12s Refine Results
  1. 881
  2. 882

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 1995
    “…The design is based on non-overlapped scanning of 3-bit fields of the multiplier. In this algorithm the partial products of the multiplicand and three bits of the multiplier are pre-calculated using only hardwired shifts. …”
    Get full text
    Get full text
    article
  3. 883

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls by SANAD, AYMAN ADEL AHMED

    Published 2025
    “…Field measurements and computer simulations are conducted to model and validate daylight performance. Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. …”
    Get full text
  4. 884

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …”
  5. 885

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis by Ghada Al-Hussain (18295426)

    Published 2022
    “…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …”
  6. 886
  7. 887
  8. 888

    Combined cycle gas turbine system optimization for extended range electric vehicles by Barakat, Aya A.

    Published 2020
    “…The two-steps methodology consists of conducting first an exergo-technological analysis using a Non-dominated Sorting Genetic Algorithm to identify the best suitable combined cycle configuration for integration in a series hybrid powertrain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 889

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…The first three techniques were automatic, employ correlation, and were variants of template matching, whereas the last one uses convolutional neural networks (CNNs). Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …”
  10. 890

    Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization by De Rochechouart, Maxence

    Published 2023
    “…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
    Get full text
  11. 891

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…</p><h3>Objective</h3><p dir="ltr">This systematic review evaluates the performance of AI models in detecting and subtyping medulloblastomas using histopathological images. …”
  12. 892
  13. 893

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …”
  14. 894

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 895

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
  16. 896

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 897
  18. 898
  19. 899
  20. 900

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article