Showing 21 - 40 results of 91 for search '(((( implement making algorithm ) OR ( element means algorithm ))) OR ( level coding algorithm ))', query time: 0.11s Refine Results
  1. 21

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…Our research also analyzed the boosting algorithms, namely Gradient Boost, XGBoost, LightGBM, and CatBoost to improve the overall performance. …”
  2. 22
  3. 23
  4. 24

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…GFT (Genetic Fuzzimetric Technique) is of no exception which merges Fuzzy logic with genetic algorithm to achieve the optimization of the decision making process under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 25

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…In the past few years, XML has been established as an effective means for information management, and has been widely exploited for complex data representation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 26
  7. 27

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 28

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
    Get full text
    Get full text
    Get full text
    article
  9. 29

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  10. 30

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  11. 31

    Optimal shunt compensators at nonsinusoidal busbars by El-Amin, I.M.

    Published 1995
    “…However, since there are limitations on the practical values of shunt capacitor, a discretizing approach making use of standard shunt capacitor values is employed to guarantee a solution that can be implemented…”
    Get full text
    Get full text
    article
  12. 32

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…However, since there are limitations on the practical values of shunt capacitor, a discretizing approach making use of standard shunt capacitor values is employed to guarantee a solution that can be implemented.…”
    Get full text
    article
  13. 33

    A hybrid EDF/FIFO queue for efficient real time flow handling by Fawaz, W.

    Published 2006
    “…This approach allows reducing EDF’s implementation complexity while making efficient use of its optimal flow management. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 34

    A novel approach for real time flows scheduling by Fawaz, W.

    Published 2006
    “…However, EDF is complex and expensive as far as implementation is concerned, especially when compared with the standard FIFO algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 35
  16. 36
  17. 37

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  18. 38

    Toward automatic motivator selection for autism behavior intervention therapy by Siyam, Nur

    Published 2022
    “…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
    Get full text
    Get full text
  19. 39
  20. 40