Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 261 - 280 results of 751 for search '(((( data models algorithm ) OR ( data using algorithm ))) OR ( elements method algorithm ))', query time: 0.13s Refine Results
  1. 261
  2. 262

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
  3. 263

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
  4. 264

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 265

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
  6. 266

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  7. 267

    Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma by Rawan AlSaad (14159019)

    Published 2019
    “…<h3>Background</h3><p dir="ltr">Predictive modeling with longitudinal electronic health record (EHR) data offers great promise for accelerating personalized medicine and better informs clinical decision-making. …”
  8. 268

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  9. 269
  10. 270

    Graph Contraction for Mapping Data on Parallel Computers by Mansour, N.

    Published 1994
    “…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …”
    Get full text
    Get full text
    Get full text
    article
  11. 271

    Mapping realistic data sets on parallel computers by Mansour, N.

    Published 1993
    “…The GC algorithm allows large-scale mapping to become efficient, especially when slow but high-quality mappers are used.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 272

    Parallel genetic algorithm for disease-gene association by Mansour, Nashat

    Published 2011
    “…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 273

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…”
    Get full text
  14. 274

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 275
  16. 276

    Spider monkey optimizations: application review and results by Abualigah, Laith

    Published 2024
    “…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
    Get full text
  17. 277
  18. 278
  19. 279

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  20. 280