Showing 441 - 460 results of 586 for search '(((( data processing algorithm ) OR ( based solution algorithm ))) OR ( element method algorithm ))', query time: 0.11s Refine Results
  1. 441
  2. 442

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 443

    Protein structure prediction in the 3D HP model by Abu-Khzam, Faisal

    Published 2009
    “…Starting from a small set of potential solutions, our algorithm efficiently explores the search space of candidate solutions and returns 3D protein structures with minimal energy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 444

    Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier by Yassine Himeur (14158821)

    Published 2021
    “…A deep evaluation of the proposed LPH-IKNN based solution is investigated under different data sets, in which the proposed scheme leads to promising performance. …”
  5. 445
  6. 446

    An evolutionary approach to load balancing parallel computations by Mansour, Nashat

    Published 1991
    “…We present a new approach to balancing the workload in a multicomputer. It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 447

    Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning by MEZAHEM, FATEMA HAMAD

    Published 2022
    “…For sentiment analysis, pre-processing is a crucial step in the data preparation process. …”
    Get full text
  8. 448

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 449

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  10. 450

    Enhanced Microgrid Reliability Through Optimal Battery Energy Storage System Type and Sizing by Mohammadreza Gholami (17032317)

    Published 2023
    “…To determine the optimized size, a firefly optimization algorithm is used as an efficient meta-heuristic approach. …”
  11. 451
  12. 452

    Communications in electronic textile systems by Nakad, Z.

    Published 2017
    “…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 453

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
    Get full text
    Get full text
    Get full text
    article
  14. 454

    High-order parametrization of the hypergeometric-Meijer approximants by Abouzeid M. Shalaby (16329062)

    Published 2023
    “…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …”
  15. 455

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  16. 456
  17. 457

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  18. 458

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 459

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 460

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”