Search alternatives:
using algorithm » cosine algorithm (Expand Search)
c4d algorithm » rd algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
Showing 201 - 220 results of 416 for search '(((( complement c4d algorithm ) OR ( present study algorithm ))) OR ( level using algorithm ))', query time: 0.11s Refine Results
  1. 201

    A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems by Raka Jovanovic (17947838)

    Published 2021
    “…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …”
  2. 202

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism by Aisha Nasser J. M. Al-Saei (17885957)

    Published 2023
    “…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …”
  3. 203

    On Single Source Reachability Improvement by Alkak, Hashem

    Published 2022
    “…We show the NP­ hardness and present an effective polynomial-time greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 204
  5. 205

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures by Ouaiss, Iyad

    Published 2017
    “…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 206

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  7. 207

    A new estimator and approach for estimating the subpopulation parameters by Mohammad Salehi M. (21259490)

    Published 2021
    “…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”
  8. 208

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes by Muhammad Mohsin Khan (22150360)

    Published 2025
    “…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …”
  9. 209

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 210

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  11. 211
  12. 212

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 213

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …”
    Get full text
    Get full text
    Get full text
  14. 214
  15. 215
  16. 216
  17. 217

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 218
  19. 219
  20. 220

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers by Tarhini, Abbas

    Published 2020
    “…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article