Showing 621 - 640 results of 892 for search '(( data using algorithm ) OR ((( develop based algorithm ) OR ( element per algorithm ))))', query time: 0.10s Refine Results
  1. 621
  2. 622

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article
  3. 623

    Automated quantification of penile curvature using artificial intelligence by Tariq O. Abbas (11247771)

    Published 2022
    “…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
  4. 624
  5. 625

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... by Mutasim Baba, Fuad

    Published 2023
    “…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. …”
    Get full text
    Get full text
    Get full text
  6. 626

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 627

    Starvation Problem in CPU Scheduling for Multimedia Systems by Salah, Khaled

    Published 2002
    “…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …”
    Get full text
    article
  8. 628

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  9. 629

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…A clinical-pharmacogenetic algorithm was developed based on whether clopidogrel shows 1) expected effect as per indication, 2) little or no effect, or 3) clinical features that patients experience and fit with clopidogrel adverse drug reactions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 630

    Positive Unlabelled Learning to Recognize Dishes as Named Entity by TAREK, AIMAN

    Published 2019
    “…I work with Yelp dataset, going through each text review, using each noun as a candidate, label the positive samples using the aforementioned lookup table, then using Positive Unlabelled learning techniques to recognise more entities within the unlabelled data, by predicting the probability for each candidate. …”
    Get full text
  11. 631

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES by Al-Garni, Ahmed Z.

    Published 2020
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  12. 632

    A linear programming approach for the weighted graph matchingproblem by Almohamad, H.A.

    Published 1993
    “…The developed algorithm is compared to two other algorithms. …”
    Get full text
    Get full text
    article
  13. 633

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems by Khaled Dhibi (16891524)

    Published 2023
    “…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
  14. 634
  15. 635
  16. 636
  17. 637

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The modeling of the pile driving process has been traditionally carried out using the one-dimensional wave equation analysis based on empirical factors to control the static and dynamic resistances developed in the soil. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 638

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK by Al-Garni, Ahmed Z.

    Published 2007
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  19. 639

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
    Get full text
  20. 640

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…Hence, solving this problem in realistic time requires the use of heuristic approaches. In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …”
    Get full text
    Get full text
    Get full text
    article