Showing 141 - 160 results of 261 for search '(( elements per algorithm ) OR ((( data code algorithm ) OR ( based all algorithm ))))', query time: 0.11s Refine Results
  1. 141

    Multidimensional Gains for Stochastic Approximation by Saab, Samer S.

    Published 2019
    “…The proposed algorithms here aim for per-iteration minimization of the mean square estimate error. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 142

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
    Get full text
    Get full text
    Get full text
    article
  3. 143

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
  4. 144

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE by ULLAH, SAAD

    Published 2022
    “…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
    Get full text
  5. 145
  6. 146

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  7. 147

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
    Get full text
    Get full text
    article
  8. 148

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 149

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…This study aims to identify the technologies for user authentication and the opportunity for their transformation to mobile money transaction security despite having all the legally required data for a transaction. …”
  10. 150
  11. 151
  12. 152

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …”
  13. 153
  14. 154

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  15. 155

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 156

    GENETIC SCHEDULING OF TASK GRAPHS by Benten, M. S.

    Published 2020
    “…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. The objective function to be minimized is the 'time on completion\ of all tasks. …”
    Get full text
    article
  17. 157

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 158

    Timing influenced general-cell genetic floorplanner by Sait, Sadiq M.

    Published 2020
    “…This phase is constraint graph based. The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …”
    Get full text
    article
  19. 159

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 160

    LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH by A. Masurkar, Faeez

    Published 2021
    “…The time of arrival (TOA) of defect waves to the sensor are extracted using the continuous wavelet transform (CWT) applied on all the residual signals and are subsequently used in the astroid algorithm to locate the damage as an enclosed area. …”
    Get full text