Showing 21 - 40 results of 301 for search '(( implement ii algorithm ) OR ((( elements method algorithm ) OR ( neural coding algorithm ))))', query time: 0.14s Refine Results
  1. 21
  2. 22

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  3. 23
  4. 24

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 25

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 26
  7. 27
  8. 28

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  9. 29

    EFFICIENT ALGORITHM FOR WEINBERGER ARRAY FOLDING by Sait, Sadiq M.

    Published 2020
    “…Weinberger arrays (WAs) are an alternative to progammable logic arrays (PLAs) as a method of implementing combinatorial logic circuits. Column folding is a technique generally employed in PLAs to save the silicon area by implementing the circuit of two column in the area of one. …”
    Get full text
    article
  10. 30
  11. 31

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  12. 32
  13. 33

    A New Parallel Genetic Algorithm Model by Al-Somani, Turki F.

    Published 2020
    “…This paper presents an implementation of three Genetic Algorithm models for solving a reliability optimization problem for a redundancy system with several failure modes, a modification on a parallel a genetic algorithm model and a new parallel genetic algorithm model. …”
    Get full text
    article
  14. 34
  15. 35

    Scalable parallel algorithms for difficult combinatorial problems by Abu-Khzam, Faisal N.

    Published 2004
    “…To accomplish this, an efficient sequential algorithm and two forms of parallel algorithms are implemented. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 36

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
    Get full text
    Get full text
    article
  17. 37
  18. 38

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  19. 39
  20. 40

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject