Search alternatives:
using algorithm » cosine algorithm (Expand Search)
c5 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
levels using » cells using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
using algorithm » cosine algorithm (Expand Search)
c5 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
levels using » cells using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
201
Process Mining over Unordered Event Streams
Published 2020“…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
Get full text
Get full text
Get full text
-
202
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
Published 2017Get full text
doctoralThesis -
203
Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d...
Published 2020“…The optimal XGBoost model prioritized age, gender, BMI and HbA1c followed by glucose levels and physical activity. Interestingly, the blood glucose level prediction by our model was influenced by use of SGLT2i.…”
-
204
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…An Evolutionary Memetic Algorithm is elaborated to solve our vehicular container placement problem. …”
Get full text
Get full text
Get full text
Get full text
article -
205
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
206
Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes
Published 2025“…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …”
-
207
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
208
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
209
A TABU SEARCH APPROACH TO THE CLUSTERING PROBLEM
Published 2020“…In this paper, we develop a new algorithm for solving this problem based on a tabu search technique. …”
Get full text
article -
210
Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes
Published 2019“…Then, the algorithm was used to process the five experimental datasets. …”
Get full text
article -
211
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
-
212
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
213
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
214
Mechanical perturbation control of cardiac alternans
Published 2018“…We analyze the effects of mechanical perturbation on the dynamics of amap model that couples themembrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. …”
Get full text
article -
215
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
-
216
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
217
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
218
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
219
Exploring the System Dynamics of Covid-19 in Emergency Medical Services
Published 2022“…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …”
Get full text
Get full text
Get full text
masterThesis -
220
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text