Search alternatives:
sampling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 181 - 200 results of 299 for search '(((( elements method algorithm ) OR ( present data algorithm ))) OR ( client sampling algorithm ))', query time: 0.12s Refine Results
  1. 181

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 182

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
    Get full text
    Get full text
    Get full text
    article
  3. 183

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 184

    Test time minimization for system-on-chip with test bus assignment and sizin by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is responsible for test data transport and is characterized by its bandwidth capacity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 185

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…In this paper, the authors present a method to automate data collection and mapping of pavement roughness on various functional classification roadways and to quantify fuel consumption for enhanced benefit-to-cost analysis, asset management and infrastructure investment strategies. …”
    Get full text
    Get full text
    Get full text
    article
  6. 186

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…This structure contains a large number of naturally-ordered cliques that are present in the association graph’s complement. A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 187

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  8. 188

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  9. 189

    A static test compaction technique for combinational circuits based on independent fault clustering by Osais, Y.E.

    Published 2003
    “…In this paper, a new static compaction algorithm for combinational circuits is presented. …”
    Get full text
    Get full text
    article
  10. 190

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…In this paper, we first propose a novel proactive location service called ATLAS that utilizes smart mobile agents to avoid the traffic overhead of traditional services and reduce the location update latency. Then, we present an Agent-Based Proactive Geographic Routing Protocol called ARDENT to route data packets with reduced delay and higher delivery ratio. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 191

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…<p dir="ltr">In this article, we present a novel deep learning-based group contribution framework for the targeted design of ionic liquids (ILs). …”
  12. 192

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
  13. 193

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
    Get full text
    Get full text
    article
  14. 194

    Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry by Issa, Leila

    Published 2016
    “…We present a new and fast method that blends altimetric and drifter positions data in order to predict the surface velocity in the Eastern Levantine Mediterranean. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 195

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …”
  16. 196

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
    Get full text
  17. 197

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration by Al-Yamani, A.

    Published 0000
    “…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …”
    Get full text
    Get full text
    article
  18. 198

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test by Hasan T. Abbas (8115014)

    Published 2019
    “…Furthermore, personal information such as age, ethnicity and body-mass index was also a part of the data-set. Using 11 OGTT measurements, we have deduced 61 features, which are then assigned a rank and the top ten features are shortlisted using minimum redundancy maximum relevance feature selection algorithm. …”
  19. 199

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 200

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix by Haraty, Ramzi Ahmed

    Published 2017
    “…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article