بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
time processing » image processing (توسيع البحث), text processing (توسيع البحث)
te algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element te » elementi per (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
time processing » image processing (توسيع البحث), text processing (توسيع البحث)
te algorithm » rd algorithm (توسيع البحث), deer algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element te » elementi per (توسيع البحث)
-
221
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
222
A comparison of optimization heuristics for the data mapping problem
منشور في 1997"…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
223
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
224
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
منشور في 2002"…The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …"
احصل على النص الكامل
احصل على النص الكامل
article -
225
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
منشور في 2019"…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…"
-
226
Burst Round Robin as a Proportional-Share Scheduling Algorithm
منشور في 2020"…Experiments on the implemented simulator showed that quickly knocking away shortest processes achieves better turnaround time, waiting time, and response time. …"
احصل على النص الكامل
article -
227
A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation
منشور في 2020"…This paper proposes a parallel algorithm for inverse halftoning by parallelizing the LUT method of inverse halftoning. …"
احصل على النص الكامل
article -
228
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
منشور في 2022احصل على النص الكامل
doctoralThesis -
229
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …"
احصل على النص الكامل
article -
230
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
231
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
masterThesis -
232
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
منشور في 2024"…Among these, K-means is widely used for efficiently solving clustering problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
233
Second-order conic programming for data envelopment analysis models
منشور في 2022"…Data envelopment analysis (DEA) is a widely used benchmarking technique. …"
احصل على النص الكامل
احصل على النص الكامل
-
234
A Scatter search algorithm for exam scheduling. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
235
Reinforcement R-learning model for time scheduling of on-demand fog placement
منشور في 2020"…We also demonstrate the ability of our model to improve over time by adapting the new demand of users. Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
236
Data mining approach to predict student's selection of program majors
منشور في 2019"…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
احصل على النص الكامل
-
237
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
منشور في 2024"…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …"
-
238
-
239
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
240
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
منشور في 0000"…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
احصل على النص الكامل
احصل على النص الكامل
article