Showing 101 - 120 results of 254 for search '(((( elements firefly algorithm ) OR ( present study algorithm ))) OR ( level coding algorithm ))', query time: 0.10s Refine Results
  1. 101

    Charge and reduce by Abu-Khzam, Faisal N.

    Published 2015
    “…We prove that String-to-String Correction is fixed-parameter tractable, for parameter k, and present a simple fixed-parameter algorithm that solves the problem in O(2kn) time. …”
    Get full text
    Get full text
    Get full text
    article
  2. 102

    On the parameterized parallel complexity and the vertex cover problem by Abu-Khzam, Faisal N.

    Published 2016
    “…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 103

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism by Aisha Nasser J. M. Al-Saei (17885957)

    Published 2023
    “…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …”
  4. 104

    On Single Source Reachability Improvement by Alkak, Hashem

    Published 2022
    “…We show the NP­ hardness and present an effective polynomial-time greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 105
  6. 106

    A new estimator and approach for estimating the subpopulation parameters by Mohammad Salehi M. (21259490)

    Published 2021
    “…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”
  7. 107

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  8. 108

    An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications by Ouaiss, I.

    Published 2017
    “…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 109

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 110
  11. 111
  12. 112

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …”
    Get full text
    Get full text
    Get full text
  13. 113
  14. 114

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers by Tarhini, Abbas

    Published 2020
    “…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 115

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  16. 116
  17. 117

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…A new low-cost and efficient technology is presented to measure and contrast vehicles' vertical accelerations over smooth and rough pavement sections. …”
    Get full text
    Get full text
    Get full text
    article
  18. 118
  19. 119

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. …”
  20. 120