Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 281 - 300 results of 751 for search '(((( data models algorithm ) OR ( data using algorithm ))) OR ( elements method algorithm ))', query time: 0.14s Refine Results
  1. 281

    Convergence behavior of the normalized least mean fourth algorithm by Zerguine, A.

    Published 2000
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    Get full text
    Get full text
    article
  2. 282

    Three-phase simulated annealing algorithms for exam scheduling by Mansour, Nashat

    Published 2003
    “…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 283

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
    Get full text
  4. 284
  5. 285

    A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS by Zerguine, Azzedine

    Published 2020
    “…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …”
    Get full text
    article
  6. 286

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 287

    Social spider optimization algorithm: survey and new applications by Abualigah, Laith

    Published 2024
    “…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
    Get full text
  8. 288
  9. 289

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  10. 290

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
  11. 291

    A comparison of optimization heuristics for the data mapping problem by Mansour, Nashat

    Published 1997
    “…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  12. 292
  13. 293

    A fast exact sequential algorithm for the partial digest problem by Mostafa M. Abbas (17058093)

    Published 2016
    “…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
  14. 294

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  15. 295
  16. 296

    Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review by Avneet Kaur (712349)

    Published 2024
    “…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …”
  17. 297
  18. 298

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
  19. 299

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir (20748764)

    Published 2024
    “…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”
  20. 300

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article