Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
iii algorithm » rd algorithm (Expand Search)
element » elements (Expand Search)
Showing 221 - 240 results of 305 for search '(( image processing algorithm ) OR ((( develop iii algorithm ) OR ( element data algorithm ))))', query time: 0.11s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…<p>Speech denoising (SD) covers the algorithms that remove the background noise from the target speech and thus improve its quality and intelligibility. …”
  5. 225
  6. 226
  7. 227

    Prolonged ventricular pause associated with ticagrelor use: A case report by Alaa Rahhal (14150403)

    Published 2023
    “…<h2>Case</h2> <p>We report a case of a 76-year-old female who presented with non-ST elevation myocardial infarction and developed a 22-second ventricular pause with ticagrelor that did not recur after shifting to clopidogrel. …”
  8. 228

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…Hence, solving this problem in realistic time requires the use of heuristic approaches. In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …”
    Get full text
    Get full text
    Get full text
    article
  9. 229
  10. 230
  11. 231
  12. 232

    A hybrid model for the optimum integration of renewable technologies in power generation systems by Poullikkas, Andreas

    Published 2011
    “…The optimization model developed uses a genetic algorithm (GA) technique for the calculation of both the additional cost of electricity due to the penetration of RES-E technologies as well as the required RES-E levy in the electricity bills in order to fund this RES-E penetration. …”
    Get full text
    article
  13. 233

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
    Get full text
    Get full text
    Get full text
    article
  14. 234

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…The cost of developing and deploying web applications is reduced by dynamically integrating other heterogeneous self-contained web services. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 235
  16. 236
  17. 237

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  18. 238
  19. 239

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…Portions of this text were previously published as part of a preprint (<a href="https://doi.org/10.21203/rs.3.rs-4724603/v1" rel="noreferrer" target="_blank">https://doi.org/10.21203/rs.3.rs-4724603/v1</a>).…”
  20. 240