Search alternatives:
data selection » data injection (Expand Search)
Showing 481 - 500 results of 575 for search '(( data selection algorithm ) OR ( based optimization algorithm ))*', query time: 0.09s Refine Results
  1. 481
  2. 482

    A Stochastic Newton-Raphson Method with Noisy Function Measurements by Saab, Khaled Kamal

    Published 2016
    “…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 483

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
    Get full text
    Get full text
    article
  4. 484

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…Two reviewers independently performed the study selection process. Three reviewers independently extracted data from the included studies. …”
  5. 485

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Study selection and data extraction were independently conducted by two reviewers. …”
  6. 486

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 487

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
    Get full text
    article
  8. 488

    Shuffled Linear Regression with Erroneous Observations by Saab, Samer S.

    Published 2019
    “…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 489

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
    Get full text
  10. 490

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…Two reviewers independently performed study selection and data extraction, and disagreements were resolved by consensus. …”
  11. 491
  12. 492

    Generic DFT approach for pattern sensitive faults in word-orientedmemories by Amin, A.A.

    Published 1996
    “…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
    Get full text
    Get full text
    article
  13. 493

    Performance Prediction Using Classification by MOOLIYIL, GITA

    Published 2019
    “…The use of classification as a data mining approach for performance prediction has been studied by many eminent researchers. …”
    Get full text
  14. 494

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 495

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  16. 496

    Local convexity preserving rational cubic spline curves by Sarfraz, M.

    Published 1997
    “…An algorithm is presented which constructs a curve by interpolating the given data points. …”
    Get full text
    Get full text
    article
  17. 497

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
    Get full text
    Get full text
    Get full text
    article
  18. 498

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
  19. 499
  20. 500