Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implementing ii » implementing iot (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implementing ii » implementing iot (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
-
201
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article -
202
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
Get full text
article -
203
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
204
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
Published 2021“…Machine learning models were the most prominent branch of AI used in the prediction of cardiac arrest in the studies (38/47, 81%), and the most used algorithm was the neural network (23/47, 49%). K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…”
-
205
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
206
A novel technique for fast multiplication
Published 1995“…The algorithms is modeled in a hardware description language and its VLSI chip implemented. …”
Get full text
Get full text
article -
207
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …”
Get full text
masterThesis -
208
A new fuzzy logic controller based IPM synchronous motor drive
Published 2003Get full text
Get full text
article -
209
A method for efficient mapping and reliable routing for NoC architectures with minimum bandwidth and area
Published 2017“…The method is implemented and various benchmarks are attempted.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
210
-
211
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…In addition the application of tabu search (TS) to scheduling and allocation is also implemented and studied. Two implementations of TS are reported and compared. …”
Get full text
article -
212
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …”
Get full text
Get full text
Get full text
masterThesis -
213
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The results that obtained from 2-classes classification showed a superiority of LSTM in terms of accuracy with 95.59%, while the best accuracy in the 6-classes classification gained from implementing CNN with 78.75%. …”
Get full text
-
214
Cross entropy error function in neural networks
Published 2002“…This paper applies artificial neural networks to forecast gasoline consumption. The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
215
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997Get full text
Get full text
article -
216
A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance
Published 2024“…Hence, in this study, deep learning algorithms, such as VGG16, EfficientNetB4, and ResNet, are utilized to diagnose various diseases, such as Alzheimer's, brain tumors, skin diseases, and lung diseases. …”
-
217
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The argued face recognition accuracy between 98%-99.2% and average processing time including metro gate opening time ranges between 1114-1400 milliseconds. …”
Get full text
-
218
Query acceleration in distributed database systems
Published 2001“…Programs were designed to implement both the original and the enhanced algorithms. …”
Get full text
Get full text
Get full text
article -
219
-
220
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The results suggest that the proposed algorithm, the optimal Kalman filter, performs better than the other two in all tests performed.…”
Get full text
article