Search alternatives:
using algorithm » cosine algorithm (Expand Search)
element based » event based (Expand Search)
Showing 561 - 580 results of 768 for search '(((( data using algorithm ) OR ( data processing algorithms ))) OR ( element based algorithm ))', query time: 0.13s Refine Results
  1. 561

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …”
  2. 562
  3. 563

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 564

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
  5. 565

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant by ALMutawa, J.

    Published 2007
    “…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…”
    Get full text
    Get full text
    article
  6. 566

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 567

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
  8. 568

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
    Get full text
    Get full text
    masterThesis
  9. 569

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …”
    Get full text
    article
  10. 570

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  11. 571

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization by Majdi Mansouri (16869885)

    Published 2022
    “…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
  12. 572

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
    Get full text
  13. 573

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 574

    Topology and parameter estimation in power systems through inverter-based broadband stimulations by Margossian, Harag

    Published 2015
    “…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 575

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…The developed cluster-based stochastic optimization approaches showed superior performance compared with baseline and sequencing heuristics using data from a real Outpatient Chemotherapy Center (OCC).…”
  16. 576

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  17. 577
  18. 578

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  19. 579

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  20. 580

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article