Search alternatives:
setting algorithm » scheduling algorithm (Expand Search)
component » components (Expand Search)
element » elements (Expand Search)
Showing 121 - 140 results of 211 for search '(((( data component algorithm ) OR ( data setting algorithm ))) OR ( element network algorithm ))', query time: 0.12s Refine Results
  1. 121

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  2. 122

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 123

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 124

    Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry by Issa, Leila

    Published 2016
    “…We present a new and fast method that blends altimetric and drifter positions data in order to predict the surface velocity in the Eastern Levantine Mediterranean. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 125

    Using machine learning for disease detection. (c2013) by Jreij, Georges Antoun

    Published 2016
    “…Classification has three main components: the classification algorithm, the pre-classified data (training data) and the un-classified data (testing data). …”
    Get full text
    Get full text
    masterThesis
  6. 126

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …”
  7. 127
  8. 128

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 129

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
    Get full text
  10. 130
  11. 131

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…We evaluate our technique on the same data sets above and new datasets with fewer drifts. …”
    Get full text
    Get full text
    Get full text
  12. 132

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration by Al-Yamani, A.

    Published 0000
    “…The architecture and the algorithm were applied to both single stuck as well as transition fault test sets…”
    Get full text
    Get full text
    article
  13. 133

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  14. 134

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 135

    High-order parametrization of the hypergeometric-Meijer approximants by Abouzeid M. Shalaby (16329062)

    Published 2023
    “…We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …”
  16. 136

    Performance Prediction Using Classification by MOOLIYIL, GITA

    Published 2019
    “…The use of classification as a data mining approach for performance prediction has been studied by many eminent researchers. …”
    Get full text
  17. 137

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  18. 138

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">A prospective cohort study was conducted on neonates at NewYork-Presbyterian Brooklyn Methodist Hospital from 2014 to 2018, categorized by their BW/PW percentile. Missing data were imputed with principal component analysis. …”
  19. 139
  20. 140

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis