Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element based » event based (Expand Search)
Showing 1 - 20 results of 379 for search '(((( present data algorithm ) OR ( element based algorithm ))) OR ( text processing algorithm ))', query time: 0.15s Refine Results
  1. 1

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 2
  3. 3

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…Pathwidth has many applications ranging from circuit layout to natural language processing. We present a linear time algorithm to approximate the pathwidth of planar graphs that have a fixed disk dimension. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Spider monkey optimizations: application review and results by Abualigah, Laith

    Published 2024
    “…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
    Get full text
  9. 9

    A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text by M. Ghoniem , Rania

    Published 2019
    “…Second, a hybrid genetic-whale optimization algorithm was proposed to optimize ontology learning from Arabic text. …”
    Get full text
    Get full text
  10. 10

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…The application of DL to cyberbullying detection problems within Arabic text classification can be considered a novel approach due to the complexity of the problem and the tedious process involved, besides the scarcity of relevant research studies.…”
    Get full text
    Get full text
  11. 11
  12. 12

    Allocating data to distributed-memory multiprocessors by genetic algorithms by Mansour, Nashat

    Published 2016
    “…We present three genetic algorithms (GAs) for allocating irregular data sets to multiprocessors. …”
    Get full text
    Get full text
    Get full text
    article
  13. 13
  14. 14

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Distributed dimension reduction algorithms for widely dispersed data by Abu-Khzam, F.N.

    Published 2002
    “…It runs in linear time and requires very little data transmission. A series of experiments is conducted to gauge how the algorithm’s emphasis on minimal data transmission affects solution quality. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 16

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  17. 17
  18. 18

    Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems by Haraty, Ramzi A.

    Published 2016
    “…In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 19
  20. 20