Search Results - (( initial evaluation cell algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- initial evaluation »
- using codification »
- codification using »
- evaluation cell »
- using algorithm »
- cell algorithm »
-
1
Computer-aided acute leukemia blast cells segmentation in peripheral blood images
Published 2015“…Accurate blast cells segmentation is the initial stage in building a successful computer-aided diagnosis system. …”
Get full text
Article -
2
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
3
Solving computational algorithm using CLONALNet technique based on artificial clonal selection
Published 2023“…CLONALNet enforces an algorithm that is much more robust in evaluating the fitness for each antibody cells since it initiates boundaries so that the initialization process doesn't run off as of previous CLONALG algorithm but still maintains the immune network interaction as in aiNet. …”
Conference paper -
4
A study on performance evaluation of conventional cache replacement algorithms: A review
Published 2017“…It initiates and configures the experimental Simple Scalar toolbox prototype on a wide range of cache sizes. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Moreover, the load sizing method for PSCs is also presented to avoid controller failure when detecting the GMPP. In evaluation part, the DSMPP algorithm has been compared with two other methods.According to both simulation and experimental results, by implementing the DSMPP technique, the GMPP can be obtained faster. …”
Get full text
Get full text
Thesis -
7
On equivalence of FIS and ELM for interpretable rule-based knowledge representation
Published 2023Article -
8
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. For example, a UAV initially served by cell A may be handed over to cell B after a certain point. …”
Get full text
Get full text
Article -
9
Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software
Published 2003“…Performance during handoff where the mobile moves from one cell, or coverage area, to another is a significant factor in evaluating wireless networks.…”
Get full text
Get full text
Thesis -
10
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis -
11
Development and characterization of parenteral nano-delivery system loaded with azithromycin
Published 2016“…The optimized nanoemulsions were evaluated for the various physicochemical properties. …”
Get full text
Get full text
Thesis
