Showing 141 - 160 results of 223 for search '(((( elements finding algorithm ) OR ( complement jaya algorithm ))) OR ( levels using algorithm ))', query time: 0.12s Refine Results
  1. 141

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 142

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
  3. 143
  4. 144
  5. 145
  6. 146

    Uplink channel estimation for IMT-DS system by Sheikh, A.U.H.

    Published 2001
    “…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…”
    Get full text
    Get full text
    article
  7. 147

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 148
  9. 149

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  10. 150

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 151
  12. 152

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  13. 153

    A novel approach for real time flows scheduling by Fawaz, W.

    Published 2006
    “…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 154
  15. 155

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
  16. 156

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures by Ouaiss, Iyad

    Published 2017
    “…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 157

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 158
  19. 159

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 160

    3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA by Makkawi, Mohammad

    Published 2020
    “…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
    Get full text
    masterThesis