Search alternatives:
processing algorithm » processing algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
pre processing » _ processing (Expand Search), image processing (Expand Search)
processing algorithm » processing algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
pre processing » _ processing (Expand Search), image processing (Expand Search)
-
121
Evacuation of a highly congested urban city
Published 2017“…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
Get full text
Get full text
Get full text
conferenceObject -
122
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …”
Get full text
-
123
Artificial intelligence-based methods for fusion of electronic health records and imaging data
Published 2022“…We searched Embase, PubMed, Scopus, and Google Scholar to retrieve relevant studies. After pre-processing and screening, we extracted data from 34 studies that fulfilled the inclusion criteria. …”
-
124
An automated temporal partitioning tool for a class of DSP applications
Published 1998“…This restructuring transformation is performed on the temporally partitioned behavior and results in near-optimization of throughput. Case study on the Joint Photographic Experts Group (jpeg) image compression algorithm demonstrates the e ectiveness of our approach.…”
Get full text
Get full text
Get full text
conferenceObject -
125
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
126
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…In addition, the effect of ion penetration on reducing the positive conductor corona inception voltage is also studied. The present algorithm is applied to different laboratory and full scale transmission line configurations. …”
Get full text
Get full text
article -
127
Charge and reduce
Published 2015“…We prove that String-to-String Correction is fixed-parameter tractable, for parameter k, and present a simple fixed-parameter algorithm that solves the problem in O(2kn) time. …”
Get full text
Get full text
Get full text
article -
128
On the parameterized parallel complexity and the vertex cover problem
Published 2016“…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
129
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
Published 2023“…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …”
-
130
On Single Source Reachability Improvement
Published 2022“…We show the NP hardness and present an effective polynomial-time greedy algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
131
A PLC based power factor controller for a 3-phase induction motor
Published 2000“…In addition to keep its voltage to frequency ratio constant in order to maintain a maximum torque over the whole control conditions. During the online process a set of capacitors sized in a binary ratio will be switched on or off with the help of zero voltage static switches according to a control strategy to obtain a pre-specified power factor. …”
Get full text
Get full text
article -
132
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
133
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”
-
134
An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications
Published 2017“…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
135
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
136
Optimizing ADWIN for Steady Streams
Published 2022“…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …”
Get full text
Get full text
Get full text
-
137
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
138
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Manually annotated data from a corpus collection was used to label the information for deep learning purposes. Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
139
An efficient approach for textual data classification using deep learning
Published 2022“…Textual data contains much useless information that must be pre-processed. We clean the data, impute missing values, and eliminate the repeated columns. …”
-
140
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
Published 2020“…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. …”
Get full text
Get full text
Get full text
Get full text
article