Search alternatives:
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
Showing 481 - 500 results of 618 for search '(((( data making algorithm ) OR ( based method algorithm ))) OR ( elements method algorithm ))', query time: 0.10s Refine Results
  1. 481

    The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation by Getahun, Fekade

    Published 2007
    “…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 482

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 483

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... by Mohamed Elsayed Saad Aboudonya (18466385)

    Published 2024
    “…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
  4. 484

    Ensemble Deep Random Vector Functional Link Neural Network for Regression by Minghui Hu (2457952)

    Published 2022
    “…The esc-edRVFL is identified as the best-performing algorithm through a comprehensive evaluation of 31 UCI datasets.…”
  5. 485

    Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine by Shomope, Ibrahim

    Published 2024
    “…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …”
    Get full text
    article
  6. 486

    An Iterative Heuristic for State Justi�cation in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we adopt a hybrid approach for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justifcation sequences vector by vector. …”
    Get full text
    article
  7. 487

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems by Khaled Dhibi (16891524)

    Published 2023
    “…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. …”
  8. 488

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  9. 489

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  10. 490

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article
  11. 491
  12. 492

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 493

    The bus sightseeing problem by Qian Hu (205735)

    Published 2023
    “…A mixed-integer programming formulation for the BSP is provided and solved by a Benders decomposition algorithm. For large-scale instances, an iterated local search based metaheuristic algorithm is developed with some tailored neighborhood operators. …”
  14. 494
  15. 495

    Finite state machine state assignment for area and power minimization by El-Maleh, A.

    Published 2006
    “…A fuzzy-based aggregation function is employed to combine the two objectives. …”
    Get full text
    Get full text
    article
  16. 496
  17. 497

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif Badran (16888785)

    Published 2022
    “…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.…”
  18. 498

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…Deep reinforcement learning (DRL) offers a data-driven alternative that couples perception with sequential decision-making. …”
  19. 499

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  20. 500

    An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks by Mohammad Zain Ul Abideen (16904637)

    Published 2022
    “…These algorithms calculate the optimal HC based on six scenarios of annual load and DER generation profiles. …”