Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
case finding » cam binding (Expand Search)
element » elements (Expand Search)
Showing 81 - 100 results of 113 for search '(((( data encoding algorithm ) OR ( case finding algorithm ))) OR ( element network algorithm ))', query time: 0.12s Refine Results
  1. 81

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The primary purpose of the Blockchain Consent Algorithm (BCA) is to find solutions for numerous unreliable nodes with varying hash values. …”
  2. 82

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…Experimental results show that the algorithm performs well on the benchmarks. The algorithm was able to find an optimum solution in many cases.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 83

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Query optimization strategies aim to minimize the cost of transferring data across networks. Many techniques and algorithms have been proposed to optimize queries. …”
    Get full text
    Get full text
    Get full text
    article
  4. 84

    QoS-driven multicast tree generation using tabu search by Youssef, H.

    Published 2020
    “…Results show that on almost all test cases, TS algorithm exhibits more intelligent search of the solution subspace and is able to find better solutions than other reported multicast algorithms.…”
    Get full text
    article
  5. 85

    The maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…With its plethora of applications, MCS is a familiar and challenging problem. Many algorithms exist that can deliver optimal MCS solutions, but whose asymptotic worst-case run times fail to do better than mere brute-force, which is exponential in the order of the smaller graph. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 86

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …”
  7. 87

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…Next, we propose an extension algorithm to further minimize the UAV’s flight distance for cases where the initial and final UAV locations are known a priori. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 88
  9. 89
  10. 90
  11. 91

    On the complexity of bilinear computations by Takche, Jean Halim

    Published 1984
    “…We will also consider special classes of three bilinear forms, and efficient algorithms will be developed, which are optimal in most cases.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 92
  13. 93

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
  14. 94

    Automatic image quality evaluation in digital radiography using for‐processing and for‐presentation images by Ioannis A. Tsalafoutas (14776939)

    Published 2024
    “…No effect of additional filtration on any of the IQ metrics was detected on images of either type. An interesting finding of the study was that for all different image acquisition selections the d’ scores were larger in raw images, whereas the other IQ metrics were larger in clinical images for most of the cases.…”
  15. 95

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…Our objective is to find the minimum power that satisfies a specific SC for both cases. …”
  16. 96

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients by Azar, Danielle

    Published 2015
    “…In this paper, we propose and compare three techniques two of which are Artificial Intelligence techniques, namely C4.5 and Case-Based Reasoning, and the third one is a meta-heuristic namely genetic algorithms. …”
    Get full text
    Get full text
    article
  17. 97

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The second case was 6-classes classification which consists of six different cyberbullying types. …”
    Get full text
  18. 98

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort by Mohamed Adil Shah Khoodoruth (14589828)

    Published 2024
    “…The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …”
  19. 99

    BioNetApp: An interactive visual data analysis platform for molecular expressions by Ali M. Roumani (18615124)

    Published 2019
    “…This study case demonstrates the effectiveness of the BioNetApp software as an interactive visual analysis tool for molecular expression data in systems biology. …”
  20. 100

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
    Get full text
    Get full text
    Get full text
    article