Showing 401 - 420 results of 506 for search '(((( develop based algorithm ) OR ( elements data algorithm ))) OR ( image using algorithms ))*', query time: 0.12s Refine Results
  1. 401

    Innovative mobile E-healthcare systems by Haraty, Ramzi A.

    Published 2016
    “…To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. Many caching approaches are proposed, but the SACCS—Scalable Asynchronous Cache Consistency Scheme—has proved to be more scalable than the others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 402

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…Hence, solving this problem in realistic time requires the use of heuristic approaches. In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …”
    Get full text
    Get full text
    Get full text
    article
  3. 403

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…The stability of a class in object-oriented system is one software quality characteristic that is important to assess at the early development stages. However, a direct measure of this software quality characteristic is not possible. …”
    Get full text
    Get full text
    Get full text
    article
  4. 404

    Big Data Energy Management, Analytics and Visualization for Residential Areas by Gupta, Ragini

    Published 2020
    “…With the rapid development of IoT based home appliances, it has become a possibility that home owners share with Utilities in the management of home appliances energy consumption. …”
    Get full text
    article
  5. 405

    Diagnosing failed distribution transformers using neural networks by Farag, A.S.

    Published 2001
    “…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. …”
    Get full text
    Get full text
    article
  6. 406

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs by Kouatli, Issam

    Published 2008
    “…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 407
  8. 408
  9. 409

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 410

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 411

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
  12. 412
  13. 413
  14. 414

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System by Mohd Imran (12249782)

    Published 2025
    “…The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …”
  15. 415
  16. 416

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  17. 417
  18. 418
  19. 419

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
  20. 420

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…An overview of its applications can inform the scientific community and facilitate further developments. In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …”