Showing 161 - 180 results of 301 for search '(( implementing ii algorithm ) OR ((( element method algorithm ) OR ( neural coding algorithm ))))', query time: 0.11s Refine Results
  1. 161

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
    Get full text
    article
  2. 162
  3. 163

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
  4. 164
  5. 165

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
  6. 166

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning by Siddiqi, Umair F.

    Published 2008
    “…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
    Get full text
    article
  7. 167

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning by Siddiqi, Umair F.

    Published 2007
    “…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
    Get full text
    article
  8. 168

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning by Siddiqi, Umair F.

    Published 2008
    “…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
    Get full text
    article
  9. 169
  10. 170

    Efficient unified Montgomery inversion with multi-bit shifting by Savas, Erkay

    Published 2005
    “…They present two inversion algorithms for binary extension and prime fields, which are slightly modified versions of the Montgomery inversion algorithm. …”
    Get full text
    Get full text
    article
  11. 171
  12. 172

    A combinatorial auction‐based approach for ridesharing in a student transportation system by Chefi Triki (14158860)

    Published 2023
    “…Three meta-heuristics, namely particle swarm optimization, dragonfly algorithm, and imperialist competitive algorithm, are implemented in the proposed framework, whose performances are assessed and compared. …”
  13. 173

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…To guarantee a fair com parison, MOA is used. Fourteen algorithms are implemented in MOA. We integrate two new algorithms (ADWIN++ and SDDM) into MOA.…”
    Get full text
    Get full text
    Get full text
  14. 174
  15. 175
  16. 176

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  17. 177

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  18. 178

    Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids by Ahmed Ouammi (14151039)

    Published 2021
    “…<p>This paper presents a scheduling framework based algorithm for reducing/shaving the peak loads in a team of cooperating microgrids (TCM) powered smart buildings taking advantages of vehicle-to-building (V2B) concept and operational flexibilities of electric vehicles (EVs). …”
  19. 179
  20. 180

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article