Search alternatives:
using algorithm » cosine algorithm (Expand Search)
c3 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
experiments » experimental (Expand Search)
Showing 141 - 160 results of 205 for search '(((( experiments based algorithm ) OR ( complement c3 algorithm ))) OR ( cells using algorithm ))', query time: 0.12s Refine Results
  1. 141

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…An Evolutionary Memetic Algorithm is elaborated to solve our vehicular container placement problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 142

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  3. 143

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…A clinical-pharmacogenetic algorithm was developed based on whether clopidogrel shows 1) expected effect as per indication, 2) little or no effect, or 3) clinical features that patients experience and fit with clopidogrel adverse drug reactions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 144

    A TABU SEARCH APPROACH TO THE CLUSTERING PROBLEM by AlSultan, K.S.

    Published 2020
    “…In this paper, we develop a new algorithm for solving this problem based on a tabu search technique. …”
    Get full text
    article
  5. 145

    HPTS: heterogeneous parallel tabu search for VLSI placement by Al-Yamani, A.

    Published 2002
    “…Two parallelization strategies, i.e., functional decomposition and multi-search thread strategies are integrated. The proposed algorithm is tested on the VLSI standard cell placement problem, however, the same algorithm can be used on any combinatorial optimization problem. …”
    Get full text
    Get full text
    article
  6. 146

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
  7. 147

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
  8. 148
  9. 149
  10. 150

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  11. 151

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
    Get full text
  12. 152

    Control of cardiac alternans by mechanical and electrical feedback by Yapari, Felicia

    Published 2014
    “…Complimentary to these studies, a three variable Nash-Panfilov model is used to investigate alternans annihilation via mechanical (or stretch) perturbations. …”
    Get full text
    article
  13. 153

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  14. 154

    Fast Methods Fbr Split Codebooks by Elshafei-Ahmed, M

    Published 2020
    “…The paper presents algorithms for the generation of the SFC mapping utilizing the self-replication feature of the curves, and a number of simulation experiments to demonstrate the effectiveness of the method. …”
    Get full text
    article
  15. 155

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  16. 156

    Iterative heuristics for multiobjective VLSI standard cellplacement by Sait, Sadiq M.

    Published 2001
    “…We employ two iterative heuristics for the optimization of VLSI standard cell placement. These heuristics are based on genetic algorithms (GA) and tabu search (TS) respectively. …”
    Get full text
    Get full text
    article
  17. 157

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... by Mohamed Elsayed Saad Aboudonya (18466385)

    Published 2024
    “…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
  18. 158

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Derivation of the basic differential equations is based on the Navier-Stokes equations of continuity and fluid motion, in addition to the convection-dispersion equation. …”
    Get full text
    Get full text
    masterThesis
  19. 159

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  20. 160

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
    Get full text
    Get full text
    Get full text
    article