Search alternatives:
processing algorithm » processing algorithms (Expand Search)
sample processing » image processing (Expand Search), melt processing (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 481 - 500 results of 730 for search '(((( data using algorithm ) OR ( sample processing algorithm ))) OR ( elements method algorithm ))*', query time: 0.11s Refine Results
  1. 481

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  2. 482

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  3. 483

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
    Get full text
    Get full text
    article
  4. 484

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article
  5. 485
  6. 486

    A new estimator and approach for estimating the subpopulation parameters by Mohammad Salehi M. (21259490)

    Published 2021
    “…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …”
  7. 487

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 488

    Starvation Problem in CPU Scheduling for Multimedia Systems by Salah, Khaled

    Published 2002
    “…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …”
    Get full text
    article
  9. 489

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  10. 490

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES by Al-Garni, Ahmed Z.

    Published 2020
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  11. 491

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems by Khaled Dhibi (16891524)

    Published 2023
    “…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
  12. 492
  13. 493
  14. 494

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 495

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK by Al-Garni, Ahmed Z.

    Published 2007
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  16. 496

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
    Get full text
  17. 497

    Competitive learning/reflected residual vector quantization for coding angiogram images by Mourn, W.A.H.

    Published 2003
    “…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
    Get full text
    Get full text
    article
  18. 498

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  19. 499

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 500

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article