بدائل البحث:
implementing two » implementing iot (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
two algorithms » _ algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
implementing two » implementing iot (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
two algorithms » _ algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
1
A Fast and Robust Gas Recognition Algorithm Based on Hybrid Convolutional and Recurrent Neural Network
منشور في 2019"…The recognition accuracies of the previous implementations are always constrained by the limited feature or dynamic information extracted from the short transient gas response curves. …"
-
2
-
3
-
4
A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation
منشور في 2020"…Keywords: (1) Inverse Halftoning (2) Hardware Implementation (3) Look-Up Table Inverse Halftoning (4) Complex Programmable Logic Devices (CPLD) (5) Image Processing…"
احصل على النص الكامل
article -
5
-
6
Variable Selection in Data Analysis: A Synthetic Data Toolkit
منشور في 2024"…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …"
احصل على النص الكامل
article -
7
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
8
-
9
-
10
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
منشور في 2024"…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …"
-
11
-
12
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…Practical constraints such as generator limits and power balance were considered. Two contemporary metaheuristic techniques, particle swarm optimization (PSO) and genetic algorithm (GA), have were simultaneously implemented for combined economic emission dispatch (CEED) of an independent power plant (IPP) situated in Pakistan for different load demands. …"
-
13
Auto-indexing Arabic texts based on association rule data mining. (c2015)
منشور في 2015"…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
14
-
15
-
16
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
منشور في 2002"…We also propose a scalable and unified architecture for a Montgomery inverse hardware that operates in both GF(p) and GF(2n) fields. We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
17
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…The proposed model was developed and implemented using MATLAB software. A Pareto front was derived from the MOGA by employing the T2FNN within the process, identifying fourteen optimal solutions.…"
-
18
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
منشور في 2018"…In addition, it can be implemented in a low-cost control platform due to its simplicity. …"
-
19
Topics in graph algorithms
منشور في 2003"…Being fixed-parameter tractable, we develop an algorithm that solves it in time O(5k + n2) where k is the input parameter. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject