Search alternatives:
using algorithm » cosine algorithm (Expand Search)
element control » tolerant control (Expand Search)
Showing 61 - 80 results of 912 for search '(((( test using algorithm ) OR ( data using algorithm ))) OR ( element control algorithm ))', query time: 0.12s Refine Results
  1. 61

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers by Mansour, Nashat

    Published 1997
    “…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
    Get full text
    Get full text
    Get full text
    article
  2. 62
  3. 63

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 64

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
    Get full text
    Get full text
    article
  5. 65
  6. 66
  7. 67

    A comparison of data mapping algorithms for parallel iterative PDE solvers by Mansour, Nashat

    Published 1995
    “…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  8. 68

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 69

    DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data by Assaf, Ali

    Published 2022
    “…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
    Get full text
  15. 75

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test by Hasan T. Abbas (8115014)

    Published 2019
    “…Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …”
  16. 76
  17. 77

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…The data was used as training and testing sets to analyze certain machine learning algorithms in terms of performance (cost / benefit analysis) and accuracy (mean error square and confusion matrix). …”
    Get full text
  18. 78

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 79
  20. 80