بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
461
High-order parametrization of the hypergeometric-Meijer approximants
منشور في 2023"…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …"
-
462
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
منشور في 2022"…The I–V characteristics of conventional and reconfigured models are programmed into the simulator and the use of the hill climbing algorithm is validated. To analyze the voltage and power oscillations with MPP tracking, the PSO algorithm is also tested for two test patterns and its results are comprehensively studied.…"
-
463
Recovery of business intelligence systems
منشور في 2018"…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
464
Phased Array Technique for Brain Source Localization
منشور في 2012احصل على النص الكامل
doctoralThesis -
465
A forward-backward Kalman for the estimation of time-variant channels in OFDM
منشور في 2005"…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
احصل على النص الكامل
احصل على النص الكامل
article -
466
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
467
Benchmarking Concept Drift Detectors for Online Machine Learning
منشور في 2022"…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
468
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
منشور في 2018"…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
احصل على النص الكامل
-
469
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
-
470
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
منشور في 0000"…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
471
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
472
PERF solutions for distributed query optimization. (c1999)
منشور في 1999احصل على النص الكامل
احصل على النص الكامل
masterThesis -
473
An easy-to-use scalable framework for parallel recursive backtracking
منشور في 2013"…Many parallel algorithms can scale to only hundreds of cores. The limiting factors of such algorithms are usually communication overhead and poor load balancing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
474
A new estimator and approach for estimating the subpopulation parameters
منشور في 2021"…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
-
475
The bus sightseeing problem
منشور في 2023"…A mixed-integer programming formulation for the BSP is provided and solved by a Benders decomposition algorithm. For large-scale instances, an iterated local search based metaheuristic algorithm is developed with some tailored neighborhood operators. …"
-
476
On scalable parallel recursive backtracking
منشور في 2015"…Many parallel algorithms can scale to only hundreds of cores. The limiting factors of such algorithms are usually communication overhead and poor load balancing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
477
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
478
Starvation Problem in CPU Scheduling for Multimedia Systems
منشور في 2002"…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
احصل على النص الكامل
article -
479
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
480
Positive Unlabelled Learning to Recognize Dishes as Named Entity
منشور في 2019"…I work with Yelp dataset, going through each text review, using each noun as a candidate, label the positive samples using the aforementioned lookup table, then using Positive Unlabelled learning techniques to recognise more entities within the unlabelled data, by predicting the probability for each candidate. …"
احصل على النص الكامل