Search alternatives:
implementing based » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
implementing based » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
181
Computation of conformal invariants
Published 2021“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
-
182
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
183
Decomposition method for solving a nonlinear business cycle model
Published 2003“…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …”
Get full text
Get full text
Get full text
Get full text
article -
184
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …”
Get full text
-
185
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
186
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
187
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
Get full text
Get full text
-
188
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…<p dir="ltr">The transient power grid stability is greatly affected by the unpredictability of inverter-based resources of today's interconnected power grids. …”
-
189
-
190
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
191
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
192
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
193
-
194
Parallel tabu search in a heterogeneous environment
Published 2003“…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …”
Get full text
Get full text
article -
195
Timing influenced general-cell genetic floorplanner
Published 2020“…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …”
Get full text
Get full text
article -
196
A novel technique for fast multiplication
Published 2020“…In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithm is modelled in a hardware description language and its VLSI chip implemented. …”
Get full text
article -
197
-
198
Cross entropy error function in neural networks
Published 2002“…The first model is a univariate model based on past GC values. The second model is a trivariate model based on GC, price and car registration time series. …”
Get full text
Get full text
Get full text
conferenceObject -
199
A method for efficient NoC test scheduling using deterministic routing
Published 2017“…The method uses a deterministic routing algorithm that minimizes test time while avoiding blocking. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
200
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis