Search Results - (( generating application window algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- generating application »
- application window »
- implication based »
- window algorithm »
- java implication »
-
1
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…This thesis gives a systematic investigation of various MLP learning mainly Sliding Window (SW) learning mode which is treated as the adaptation of offline algorithms into online application Consequently this thesis reviews various offline algorithms including: batch backpropagation, nonlinear conjugate gradient, limited memory and full-memory Broyden, Fletcher, Goldfarb and Shanno algorithms and different forms of the latest proposed bimary ensemble learning. …”
Get full text
Get full text
Thesis -
2
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…The initial feasible solutions have been generated for this purpose. The solutions have been significantly improved by the algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
Time-Frequency Analysis of FSK Digital Modulation Signals using the Smooth Lag-Windowed Wigner-Ville Distribution.
Published 2003Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
CC_TRS: continuous clustering of trajectory stream data based on micro cluster life
Published 2017“…The evaluation of the proposed algorithm on real data sets shows the efficiency and the effectiveness of the proposed algorithm and proved it is efficient alternative to time window technique.…”
Get full text
Get full text
Get full text
Article -
6
Memristor based ring oscillators true random number generator with different window functions for applications in cryptography
Published 2023“…For example, producing digital signatures using supporting quantities or in verification procedures that requires generating challenges. Random number generation is an important part of cryptography because there are flaws in random number generation that can be taken advantage by attackers that compromised encryption systems that are algorithmically secure. …”
Article -
7
-
8
-
9
-
10
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…The integration with algorithm that generates fingerprints from the method ST-PSD with several parameter configurations (Windows size, threshold, and sub-score linear combination coeffcient). …”
Article -
11
-
12
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The clustering algorithm consists of two components: the temporal micro-clusters generation and the temporal micro clusters merging. …”
Get full text
Get full text
Thesis -
13
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
MSS-TCP: a congestion control algorithm for boosting TCP performance in mmwave cellular networks
Published 2025“…This paper proposes MSS-TCP, a novel congestion control algorithm designed for mmWave networks. MSS-TCP dynamically adjusts the congestion window (cwnd) based on the maximum segment size (MSS) and round-trip time (RTT), improving bandwidth utilization and congestion adaptability. …”
Get full text
Get full text
Get full text
Article -
17
Exploration of educational building with cultural elements using shape grammar
Published 2013“…Shape grammars are used for developing computational algorithms in production systems that generate geometric shapes. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
Sketching car’s side view using playground AI / Rafizah Kechil and Azlina Mohd Mydin
Published 2024“…Leveraging cutting-edge generative AI algorithms like DALL-E from OpenAI, Playground AI can transform our concepts into breathtaking art pieces and lifelike imagery. …”
Get full text
Get full text
Monograph -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This strategy includes a number of components that are a novel approach to clustering generation. In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis
