Search alternatives:
using algorithm » cosine algorithm (Expand Search)
two algorithms » _ algorithms (Expand Search)
develop » developed (Expand Search)
Showing 661 - 680 results of 901 for search '(((( develop two algorithms ) OR ( elements network algorithm ))) OR ( data using algorithm ))', query time: 0.12s Refine Results
  1. 661

    Neural network-based failure rate prediction for De Havilland Dash-8 tires by Al-Garni, Ahmed Z.

    Published 2006
    “…Six years of data are used for model building and validation. …”
    Get full text
    article
  2. 662

    Local convexity preserving rational cubic spline curves by Sarfraz, M.

    Published 1997
    “…An algorithm is presented which constructs a curve by interpolating the given data points. …”
    Get full text
    Get full text
    article
  3. 663

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 664

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 665

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
  6. 666
  7. 667
  8. 668

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…Nevertheless, the rapid growth of IoT devices has introduced significant security concerns like device vulnerabilities, unauthorized access, and potential data breaches.This article deals with an immediate call to empower IoT resilience against a wide range of sophisticated and prevalent cybersecurity threats. We developed two novel hybrid deep learning mechanisms, CNN-GRU (Convolutional Gated Recurrent Neural Networks) and CNN-LSTM (Convolutional Long Short-Term Memory Neural Networks), and extensively evaluated their performance on the state-of-the-art Kitsune and TON-IoT publicly available datasets. …”
  9. 669

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  10. 670

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 671

    An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models by K. Mukilan (22224793)

    Published 2024
    “…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. …”
  12. 672

    Generic metadata representation framework for social-based event detection, description, and linkage by Abebe, Minale A.

    Published 2020
    “…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 673

    Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation by Khaliqur Rahman (10214098)

    Published 2019
    “…The hardware setup is developed and control algorithm is implemented using dSPACE working in conjunction with the FPGA interface board for practical validation.…”
  14. 674
  15. 675

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …”
  16. 676

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  17. 677

    A LINEAR-PROGRAMMING APPROACH FOR THE WEIGHTED GRAPH MATCHING PROBLEM by Al-Mohamad, HA

    Published 2020
    “…The developed algorithm is compared to two other algorithms. …”
    Get full text
    article
  18. 678

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…Implementing PM in routine clinical care does require some investment and infrastructure development. Invariably, cost and lack of expertise are cited as barriers to PM implementation. …”
  19. 679

    Parallel processing by Mansour, Nashat

    Published 2005
    “…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 680

    Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method by Mohamed Massaoudi (16888710)

    Published 2021
    “…The hyper-parameters of the proposed stacking ensemble are carefully tuned using the tree-structured of parzen estimators algorithm to achieve top-notch predictive performance. …”