Showing 461 - 480 results of 700 for search '(((( data models algorithm ) OR ( designed using algorithm ))) OR ( element data algorithm ))', query time: 0.11s Refine Results
  1. 461
  2. 462

    Exploring Digital Competitiveness through Bayesian Belief Networks by Qazi, Abroon

    Published 2025
    “…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …”
    Get full text
    article
  3. 463

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem by Abu Zitar, Raed

    Published 2021
    “…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …”
    Get full text
  4. 464
  5. 465
  6. 466

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis by Jithin Kalathikudiyil Sreedharan (18268894)

    Published 2024
    “…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
  7. 467

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
    Get full text
    Get full text
    article
  8. 468

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  9. 469

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK by Al-Garni, Ahmed Z.

    Published 2007
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  10. 470

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 471

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 472

    Fast force-directed/simulated evolution hybrid for multiobjective VLSI cell placement by Sait, Sadiq M.

    Published 2004
    “…In this work, a fast hybrid algorithm is designed to address this problem. The algorithm employs simulated evolution (SE), an iterative search heuristic that comprises three steps: evaluation, selection and allocation. …”
    Get full text
    Get full text
    article
  13. 473
  14. 474

    A new fuzzy logic controller based IPM synchronous motor drive by Abido, M.A.

    Published 2003
    “…The FLC parameters are optimized by genetic algorithm. The complete vector control scheme incorporating the FLC is successfully implemented in real-time using a digital signal processor board DS 1102 for a laboratory 1 hp interior permanent magnet (IPM) motor. …”
    Get full text
    Get full text
    article
  15. 475

    Reliability and fault tolerance based topological optimization of computer networks - part I: enumerative techniques by Abd-El-Barr, Mostafa

    Published 2003
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using existing techniques. …”
    Get full text
    Get full text
    article
  16. 476

    A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks by Shaik, Muzibur Rehman

    Published 2007
    “…OSPF calculates the shortest paths from each source to all destinations using the Dijkstra’s algorithm based on the weights assigned to the links. …”
    Get full text
    masterThesis
  17. 477
  18. 478

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Programs were designed to implement both the original and the enhanced algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  19. 479

    Electric Vehicles Charging Station Load Forecasting Integration With Renewable Energy Using Novel Deep EfficientBiLSTMNet by Vineet Dhanawat (22361395)

    Published 2025
    “…The model’s hyperparameters are optimized using an Enhanced Firefly Algorithm (EFA). …”
  20. 480