Showing 241 - 260 results of 1,056 for search '(((( data using algorithm ) OR ( problem using algorithm ))) OR ( element data algorithm ))*', query time: 0.15s Refine Results
  1. 241
  2. 242

    Starvation Problem in CPU Scheduling for Multimedia Systems by Salah, Khaled

    Published 2002
    “…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …”
    Get full text
    article
  3. 243

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 244

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …”
    Get full text
  5. 245

    Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect by Habeeb, Abdallah

    Published 2022
    “…The second phase, modified the Artificial Bee Colony (ABC) Algorithm, with Upper Confidence Bound (UCB) Algorithm, to promote the exploitation ability for the minimum dimension, to get the minimum number of the optimal feature, then using forward feature selection strategy by four classifiers of machine learning algorithms: (K-Nearest Neighbors (KNN), Support vector machines (SVM), Naïve-Bayes (NB), and Polynomial Neural Networks (PNN). …”
    Get full text
  6. 246

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text
  7. 247
  8. 248
  9. 249

    On the parameterized parallel complexity and the vertex cover problem by Abu-Khzam, Faisal N.

    Published 2016
    “…We initiate the study of FPPT with the well-known k-vertex cover problem. In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 250

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  11. 251

    Data Generation for Path Testing by Mansour, Nashat

    Published 2004
    “…These algorithms are based on an optimization formulation of the path testing problem which include both integer- and real-value test cases. …”
    Get full text
    Get full text
    Get full text
    article
  12. 252
  13. 253

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…Scheduling and allocation can be formulated as an optimization problem. In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. …”
    Get full text
    article
  14. 254

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  15. 255

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm by Noor Habib Khan (22224775)

    Published 2024
    “…Moreover, ILCA is applied to resolve the stochastic renewable‐based (wind turbines + PVs) optimal power flow problem using a modified RER‐based IEEE 57‐bus. The objective of this work is to obtain the minimum predicted power losses and enhance the predicted voltage stability. …”
  16. 256
  17. 257

    Fuzzy genetic algorithm for floorplanning by Youssef, H.

    Published 2020
    “…Genetic algorithms (GAs) have been found to be very effective in solving numerous optimization problems, especially those with many (possibly) conflicting and noisy objectives. …”
    Get full text
    article
  18. 258

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  19. 259
  20. 260

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis