Search alternatives:
using algorithm » cosine algorithm (Expand Search)
element based » event based (Expand Search)
Showing 621 - 640 results of 889 for search '(((( data using algorithm ) OR ( solved using algorithm ))) OR ( element based algorithm ))', query time: 0.14s Refine Results
  1. 621

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…A case study using real population and transportation network data was tested using the proposed methodology. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 622

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
  3. 623

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 624

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
    Get full text
    Get full text
    masterThesis
  5. 625

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
    Get full text
    Get full text
    Get full text
  6. 626

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization by Majdi Mansouri (16869885)

    Published 2022
    “…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
  7. 627

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
    Get full text
  8. 628

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 629

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC by Abbas, Nadine

    Published 2022
    “…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 630
  11. 631

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 632

    Multi-Objective Optimization for Food Availability under Economic and Environmental Risk Constraints by Bashar Hassna (19170940)

    Published 2024
    “…Utilizing these assessments, a multi-objective optimization model is developed and solved using MATLAB (R2018a)’s Genetic Algorithm, aiming to identify optimal suppliers to meet Qatar’s food demand, with consideration of the economic, environmental, and risk factors. …”
  13. 633

    A forward-backward Kalman for the estimation of time-variant channels in OFDM by Al-Naffouri, T.Y.

    Published 2005
    “…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
    Get full text
    Get full text
    article
  14. 634
  15. 635

    Shuffled Linear Regression with Erroneous Observations by Saab, Samer S.

    Published 2019
    “…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 636

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  17. 637

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  18. 638
  19. 639

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  20. 640

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
    Get full text
    Get full text
    article