Search alternatives:
system algorithm » swarm algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
complex system » complaint system (Expand Search)
level using » level fusion (Expand Search)
Showing 101 - 120 results of 394 for search '(((( relevant data algorithm ) OR ( complex system algorithm ))) OR ( level using algorithm ))', query time: 0.19s Refine Results
  1. 101

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) by Wehbe, Gioia Wahib

    Published 2016
    “…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…”
    Get full text
    Get full text
    masterThesis
  2. 102

    A Parallel Genetic Algorithm for the Geometrically Constrained Site Layout Problem with Unequal-Size Facilities by Zouein, Pierrette P.

    Published 2010
    “…Parallel genetic algorithms techniques have been used in a variety of computer engineering and science areas. …”
    Get full text
    Get full text
    Get full text
    article
  3. 103
  4. 104

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. …”
  5. 105
  6. 106
  7. 107

    Integrated economic and environmental models for a multi stage cold supply chain under carbon tax regulation by Hariga, Moncer

    Published 2017
    “…The elevated level of public and organizations awareness concerning sustainability has necessitated the adoption of environmentally conscious practices in the management of supply chains. …”
    Get full text
    article
  8. 108
  9. 109
  10. 110

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  11. 111

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …”
    Get full text
  12. 112

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…In this paper, we present a heuristic approach that relies on the adaptation and recombination of already built predictive models to new unseen software.The predictive models are all rule-based models and the approach is tested on the stability of classes in an object-oriented software system. We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…”
    Get full text
    Get full text
    Get full text
    article
  13. 113

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 114

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”
  15. 115

    Robust tuning of power system stabilizers in multimachine powersystems by Abdel-Magid, Y.L.

    Published 2000
    “…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. The objective function allows the selection of the stabilizer parameters to optimally place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane. …”
    Get full text
    Get full text
    article
  16. 116

    Reinforcement Learning-Based School Energy Management System by Yassine Chemingui (18891757)

    Published 2020
    “…Conventional Building Energy Management methods suffer from a high dimensional and complex control environment. In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …”
  17. 117

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…However, FRP-reinforced concrete (RC) structures exhibit less ductile response compared to steel RC structures. Recently, the use of basalt fiber reinforced concrete (BFRC) reinforced with BFRP bars was investigated to achieve a reasonable level of ductility in BFRC-BFRP one-way slabs. …”
  18. 118

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …”
    Get full text
    masterThesis
  19. 119
  20. 120