Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 501 - 520 results of 758 for search '(((( data using algorithm ) OR ( image processing algorithm ))) OR ( element method algorithm ))*', query time: 0.12s Refine Results
  1. 501

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
    Get full text
    Get full text
    Get full text
  2. 502

    Graph contraction for physical optimization methods by Mansour, Nashat

    Published 1993
    “…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 503

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration by Al-Yamani, A.

    Published 0000
    “…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …”
    Get full text
    Get full text
    article
  4. 504

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…A case study using real population and transportation network data was tested using the proposed methodology. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 505

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant by ALMutawa, J.

    Published 2007
    “…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…”
    Get full text
    Get full text
    article
  6. 506

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 507

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
    Get full text
    Get full text
    masterThesis
  8. 508

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  9. 509

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
    Get full text
    Get full text
    Get full text
  10. 510

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization by Majdi Mansouri (16869885)

    Published 2022
    “…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
  11. 511

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
    Get full text
  12. 512

    High-order parametrization of the hypergeometric-Meijer approximants by Abouzeid M. Shalaby (16329062)

    Published 2023
    “…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …”
  13. 513

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 514

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  15. 515
  16. 516

    A forward-backward Kalman for the estimation of time-variant channels in OFDM by Al-Naffouri, T.Y.

    Published 2005
    “…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
    Get full text
    Get full text
    article
  17. 517

    Shuffled Linear Regression with Erroneous Observations by Saab, Samer S.

    Published 2019
    “…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 518

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  19. 519

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  20. 520

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”