Showing 121 - 140 results of 276 for search '(( present study algorithm ) OR ((( pre processing algorithm ) OR ( neural coding algorithm ))))*', query time: 0.09s Refine Results
  1. 121

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 122

    Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning by MEZAHEM, FATEMA HAMAD

    Published 2022
    “…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …”
    Get full text
  3. 123

    Artificial intelligence-based methods for fusion of electronic health records and imaging data by Farida Mohsen (16994682)

    Published 2022
    “…We searched Embase, PubMed, Scopus, and Google Scholar to retrieve relevant studies. After pre-processing and screening, we extracted data from 34 studies that fulfilled the inclusion criteria. …”
  4. 124

    An automated temporal partitioning tool for a class of DSP applications by Ouaiss, Iyad

    Published 1998
    “…This restructuring transformation is performed on the temporally partitioned behavior and results in near-optimization of throughput. Case study on the Joint Photographic Experts Group (jpeg) image compression algorithm demonstrates the e ectiveness of our approach.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 125

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  6. 126

    Inception voltage of corona in bipolar ionized fields-effect oncorona power loss by Al-Hamouz, Z.

    Published 1996
    “…In addition, the effect of ion penetration on reducing the positive conductor corona inception voltage is also studied. The present algorithm is applied to different laboratory and full scale transmission line configurations. …”
    Get full text
    Get full text
    article
  7. 127

    Charge and reduce by Abu-Khzam, Faisal N.

    Published 2015
    “…We prove that String-to-String Correction is fixed-parameter tractable, for parameter k, and present a simple fixed-parameter algorithm that solves the problem in O(2kn) time. …”
    Get full text
    Get full text
    Get full text
    article
  8. 128

    On the parameterized parallel complexity and the vertex cover problem by Abu-Khzam, Faisal N.

    Published 2016
    “…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 129

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism by Aisha Nasser J. M. Al-Saei (17885957)

    Published 2023
    “…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …”
  10. 130

    On Single Source Reachability Improvement by Alkak, Hashem

    Published 2022
    “…We show the NP­ hardness and present an effective polynomial-time greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 131

    A PLC based power factor controller for a 3-phase induction motor by Al-Ali, A.R.

    Published 2000
    “…In addition to keep its voltage to frequency ratio constant in order to maintain a maximum torque over the whole control conditions. During the online process a set of capacitors sized in a binary ratio will be switched on or off with the help of zero voltage static switches according to a control strategy to obtain a pre-specified power factor. …”
    Get full text
    Get full text
    article
  12. 132
  13. 133

    A new estimator and approach for estimating the subpopulation parameters by Mohammad Salehi M. (21259490)

    Published 2021
    “…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”
  14. 134

    An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications by Ouaiss, I.

    Published 2017
    “…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 135

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 136

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …”
    Get full text
    Get full text
    Get full text
  17. 137
  18. 138

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…Manually annotated data from a corpus collection was used to label the information for deep learning purposes. Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
    Get full text
  19. 139

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…Textual data contains much useless information that must be pre-processed. We clean the data, impute missing values, and eliminate the repeated columns. …”
  20. 140

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers by Tarhini, Abbas

    Published 2020
    “…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article