Showing 461 - 480 results of 611 for search '(( elements per algorithm ) OR ((( data processing algorithm ) OR ( designed using algorithm ))))', query time: 0.11s Refine Results
  1. 461

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 1995
    “…In this algorithm the partial products of the multiplicand and three bits of the multiplier are pre-calculated using only hardwired shifts. …”
    Get full text
    Get full text
    article
  2. 462
  3. 463

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…Towards this, we first overview the existing traditional RRAM methods and identify their limitations that motivate the use of DRL techniques in RRAM. Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …”
  4. 464

    Toward automatic motivator selection for autism behavior intervention therapy by Siyam, Nur

    Published 2022
    “…We use a Q-learning algorithm to solve the modeled problem. …”
    Get full text
    Get full text
  5. 465

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  6. 466

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 467

    Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review by SHEHADEH, KHADIJA

    Published 2023
    “…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
    Get full text
  8. 468

    Efficient unified Montgomery inversion with multi-bit shifting by Savas, Erkay

    Published 2005
    “…The similarity of the two algorithms allows the design of a single unified hardware architecture that performs the computation of inversion in both fields. …”
    Get full text
    Get full text
    article
  9. 469

    A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making by Sachin Jain (19161721)

    Published 2024
    “…The availability of solar radiation throughout the country has been mapped here using ground-based measurements and satellite data. The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
  10. 470

    An evolutionary approach to load balancing parallel computations by Mansour, Nashat

    Published 1991
    “…It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 471

    Positive Unlabelled Learning to Recognize Dishes as Named Entity by TAREK, AIMAN

    Published 2019
    “…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …”
    Get full text
  12. 472

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  13. 473

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. …”
    Get full text
    Get full text
    article
  14. 474

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes by Wadi, Ali

    Published 2019
    “…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
    Get full text
    article
  15. 475

    Timing influenced general-cell genetic floorplanner by Sait, Sadiq M.

    Published 2020
    “…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …”
    Get full text
    Get full text
    article
  16. 476
  17. 477

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 478

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 479

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
    Get full text
    Get full text
    article
  20. 480