PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact


Search


PDF Archive search engine
Last database update: 23 October at 20:02 - Around 210000 files indexed.

Show results per page

Results for «algorithm»:


Total: 2000 results - 0.073 seconds

UNIT-1 QB 100%

Define notation of an algorithm.

https://www.pdf-archive.com/2017/04/02/unit-1-qb/

02/04/2017 www.pdf-archive.com

DesignAadAnalysisSOfAlgorithmsUnit1 99%

Design and Analysis of Algorithms 10CS43 UNIT – 1 INTRODUCTION 1.1 Notion of Algorithm Need for studying algorithms:

https://www.pdf-archive.com/2015/08/23/designaadanalysissofalgorithmsunit1/

23/08/2015 www.pdf-archive.com

2016 ESWA BioInspiredComputing 99%

While some studies are exploring the application of these algorithms in a novel context, other studies are incrementally improving the algorithm itself.

https://www.pdf-archive.com/2016/05/23/2016-eswa-bioinspiredcomputing/

23/05/2016 www.pdf-archive.com

dogan memisoglu bilgehan aktepe 98%

DEVELOPING FAST FOURIER TRANSFORM ALGORITHM ON FPGA BOARD WITH OPTIMUM PERFORMANCE Design Report www.digilentdesigncontest.com DEVELOPING FAST FOURIER TRANSFORM ALGORITHM ON FPGA BOARD WITH OPTIMUM PERFORMANCE BILGEHAN AKTEPE c1117002@student.cankaya.edu.tr DOGAN MEMİŞOĞLU c1214038@student.cankaya.edu.tr Submitted for the 2017 Digilent Design Contest Europe May 2017 Advisor:

https://www.pdf-archive.com/2017/05/12/dogan-memisoglu-bilgehan-aktepe/

12/05/2017 www.pdf-archive.com

16I18-IJAET0118653 v6 iss6 2455-2463 98%

Traditional scheduling algorithms like Round Robin (RR)scheduling algorithm, First Come First Served (FCFS)scheduling algorithm, Min–Min algorithm and Max–Min algorithm are BMHA algorithms.

https://www.pdf-archive.com/2014/07/04/16i18-ijaet0118653-v6-iss6-2455-2463/

04/07/2014 www.pdf-archive.com

IJETR2217 98%

A text, message or data that is converted into gibberish format using any the encryption algorithm is known as a cipher.

https://www.pdf-archive.com/2017/09/09/ijetr2217/

09/09/2017 www.pdf-archive.com

DesignAadAnalysisSOfAlgorithmsSyllabus 98%

Notion of Algorithm, Review of Asymptotic Notations, Mathematical Analysis of Non-Recursive and Recursive Algorithms Brute Force Approaches:

https://www.pdf-archive.com/2015/08/23/designaadanalysissofalgorithmssyllabus/

23/08/2015 www.pdf-archive.com

0B8FE792-4631-483A-B50A-6F3DFEC296C4 97%

A Fast Bit-Vector Algorithm for Approximate String Matching Based on Dynamic Programming GENE MYERS University of Arizona, Tucson, Arizona Abstract.

https://www.pdf-archive.com/2017/12/15/0b8fe792-4631-483a-b50a-6f3dfec296c4/

15/12/2017 www.pdf-archive.com

9I14-IJAET0514286 v6 iss2 639to647 97%

2231-1963 FPGA IMPLEMENTATION OF AREA EFFICIENT ADAPTIVE FILTER USING ARRAY OF SENSORS Anamika Gupta1 and Rajesh Mehra2 1 ME Student, Department of ECE, NITTTR, Chandigarh, India 2 Associate Professor, Department of ECE, NITTTR, Chandigarh, India ABSTRACT In this paper an area efficient Cordic based adaptive algorithm has been designed and simulated for Digital Signal Processing.

https://www.pdf-archive.com/2013/05/13/9i14-ijaet0514286-v6-iss2-639to647/

13/05/2013 www.pdf-archive.com

document 97%

These capabilities when applied to any algorithm make it more scalable, reliable and efficient while keeping it simple.

https://www.pdf-archive.com/2018/06/05/document/

05/06/2018 www.pdf-archive.com

22I16-IJAET0916945 v6 iss4 1639to1646 97%

22311963 ADAPTIVE GENETIC ALGORITHM WITH NEURAL NETWORK FOR MACHINERY FAULT DETECTION B.Kishore1, M.R.S.Satyanarayana2 and K.Sujatha3 1Assistant Professor, Dept.

https://www.pdf-archive.com/2014/07/04/22i16-ijaet0916945-v6-iss4-1639to1646/

04/07/2014 www.pdf-archive.com

IJETR2151 97%

2321-0869 (O) 2454-4698 (P), Volume-7, Issue-4, April 2017 Comparative Analysis of KNN and C5.0 Algorithm for Smart City Classification Pragya Sharma, Deep Kumar  the ability of classification of a dataset.

https://www.pdf-archive.com/2017/09/09/ijetr2151/

09/09/2017 www.pdf-archive.com

EM Algorithms 97%

Understanding the Multiple Algorithm Approach Everyday Mathematics encourages students to learn multiple algorithms for doing arithmetic operations.

https://www.pdf-archive.com/2012/03/27/em-algorithms/

27/03/2012 www.pdf-archive.com

23I20-IJAET0520914 v7 iss2 488-494 97%

A K-means clustering algorithm is one of the most popular to used data objects into K cluster analysis.

https://www.pdf-archive.com/2014/07/04/23i20-ijaet0520914-v7-iss2-488-494/

04/07/2014 www.pdf-archive.com

Grad CourseDescriptions ResearchArea 97%

Informally, a data analysis algorithm is differentially private if changing the data of a single individual changes the output distribution of the algorithm only slightly.

https://www.pdf-archive.com/2017/07/23/grad-coursedescriptions-researcharea/

23/07/2017 www.pdf-archive.com

4I17-IJAET1117396 v6 iss5 1977-1987 97%

To protect information from disclosed by the attacker encryption must be apply on the information, the encryption propose is based on logarithm equation, where the logarithm base will be act as the secret key of the algorithm.

https://www.pdf-archive.com/2014/07/04/4i17-ijaet1117396-v6-iss5-1977-1987/

04/07/2014 www.pdf-archive.com

Formal Asymptotic Analysis of Online Scheduling Algorithms for Plug-In Electric Vehicles’ Charging 97%

Generally, the computational complexity of an algorithm is computed using asymptotic analysis.

https://www.pdf-archive.com/2018/12/22/untitled-pdf-document-36/

22/12/2018 www.pdf-archive.com

HW 3.1 96%

After testing the algorithm a few times, and after some careful inspection, I realized that the algorithm is simply a version of insertion sort.

https://www.pdf-archive.com/2013/10/15/hw-3-1/

15/10/2013 www.pdf-archive.com

25I18-IJAET0118708 v6 iss6 2531-2536 96%

Enhance k-means, Kernelized initialisation, clustering algorithm.

https://www.pdf-archive.com/2014/07/04/25i18-ijaet0118708-v6-iss6-2531-2536/

04/07/2014 www.pdf-archive.com

Writeup 96%

E7 Final Project Alexandre Dang, Dante Gao, Daniel Gribble April 29, 2016 Abstract This algorithm (attempts to) solve the marching band problem.

https://www.pdf-archive.com/2016/04/29/writeup/

29/04/2016 www.pdf-archive.com

22N13-IJAET0313536 revised 96%

2231-1963 SEGMENTATION OF IMAGES USING HISTOGRAM BASED FCM CLUSTERING ALGORITHM AND SPATIAL PROBABILITY Meenakshi M.

https://www.pdf-archive.com/2013/05/13/22n13-ijaet0313536-revised/

13/05/2013 www.pdf-archive.com

23I15-IJAET0715619 v6 iss3 1220to1227 96%

Efficient algorithm to discover frequent patterns is essential in data mining research.

https://www.pdf-archive.com/2014/07/04/23i15-ijaet0715619-v6-iss3-1220to1227/

04/07/2014 www.pdf-archive.com

Evaluation of a 1 MW, 250 kW-hr Battery Energy Storage System for Grid Services for the Island of Hawaii 96%

site preparation, material procurement, electrical design, communications design, and algorithm development.

https://www.pdf-archive.com/2018/12/01/untitled-pdf-document-2/

01/12/2018 www.pdf-archive.com

48N13-IJAET0313497 revised 96%

Two advanced PSO algorithms, known as the dynamic particle swarm optimisation (Dynamic PSO) and the chaos particle swarm optimisation (Chaos PSO) algorithms modify the algorithm parameters to improve the performance of the standard PSO algorithm.

https://www.pdf-archive.com/2013/05/13/48n13-ijaet0313497-revised/

13/05/2013 www.pdf-archive.com

DesignAadAnalysisSOfAlgorithmsUnit2 96%

conquer is a general algorithm design strategy with a general plan as follows:

https://www.pdf-archive.com/2015/08/23/designaadanalysissofalgorithmsunit2/

23/08/2015 www.pdf-archive.com