Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
elements modeling » event modeling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 541 - 560 results of 756 for search '(((( data using algorithm ) OR ( data processing algorithm ))) OR ( elements modeling algorithm ))*', query time: 0.12s Refine Results
  1. 541

    A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System by Kouatli, Issam

    Published 2016
    “…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 542

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 543
  4. 544

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements by Emara-Shabaik, Husam

    Published 2020
    “…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. …”
    Get full text
    article
  5. 545
  6. 546

    Graph contraction for physical optimization methods by Mansour, Nashat

    Published 1993
    “…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 547

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration by Al-Yamani, A.

    Published 0000
    “…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …”
    Get full text
    Get full text
    article
  8. 548

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant by ALMutawa, J.

    Published 2007
    “…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…”
    Get full text
    Get full text
    article
  9. 549

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 550

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
    Get full text
    Get full text
    masterThesis
  11. 551

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization by Majdi Mansouri (16869885)

    Published 2022
    “…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
  12. 552

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
    Get full text
  13. 553
  14. 554

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  15. 555

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  16. 556

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 557

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
  18. 558

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 559

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  20. 560

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article