Showing 1 - 20 results of 74 for search '(((( dependent processing algorithm ) OR ( elements rl algorithm ))) OR ( level coding algorithm ))', query time: 0.14s Refine Results
  1. 1
  2. 2

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 3
  4. 4

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain by Al Sadawi, Alia

    Published 2021
    “…The objective is to minimize different cost types while satisfying constraints such as resources availability, customer service level, and tasks dependency relation. The algorithm proved its effectiveness by allocating tasks with higher priority and weight while taking into consideration customers’ Service Level Agreement, time, and different types of costs, which led to a lower total cost of the batching process. …”
    Get full text
    article
  5. 5
  6. 6
  7. 7

    Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application by Aram Rostami (22045274)

    Published 2024
    “…K<sub>med</sub> is calculated for D<sub>m.m</sub> and D<sub>w.w </sub>algorithm types in bone and lung media for both photon beams. …”
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  13. 13
  14. 14

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15
  16. 16

    An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling by ALKETBI, SAIF

    Published 2016
    “…The proposed algorithm out performed fairly well the results that exists from previous studies. …”
    Get full text
  17. 17

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For a given parameterized problem, π, a kernelization algorithm is a polynomial-time pre-processing procedure that transforms an arbitrary instance of π into an equivalent one whose size depends only on the input parameter(s). …”
    Get full text
    Get full text
    Get full text
    article
  18. 18
  19. 19
  20. 20