Showing 821 - 840 results of 1,014 for search '(( data using algorithm ) OR ((( developing a algorithm ) OR ( element data algorithm ))))*', query time: 0.13s Refine Results
  1. 821

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  2. 822

    LINE SEARCH TECHNIQUES FOR THE LOGARITHMIC BARRIER FUNCTION IN QUADRATIC-PROGRAMMING by Bendaya, M.

    Published 2020
    “…In this paper, we propose a line-search procedure for the logarithmic barrier function in the context of an interior point algorithm for convex quadratic programming. …”
    Get full text
    article
  3. 823

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing by Xin Li (51274)

    Published 2020
    “…Interestingly, with respect to the amount of allocation resource, it can obtain the maximum value density when offloading energy consumption equals to half of local energy consumption. Finally, we propose a low-complexity heuristic resource allocation algorithm based on this novel theoretical discovery. …”
  4. 824

    Noise-Robust Parameter Estimation Of Linear Systems by Emara-Shabaik, Husam

    Published 2020
    “…Under this realistic situation, the least squares parameters estimation is nown to be biased. In this paper, a recursive parameters stimation algorithm, which is unbiased for a wide class of measurement noise, is developed. …”
    Get full text
    article
  5. 825
  6. 826
  7. 827

    Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis by Ashraf Gad (17040114)

    Published 2024
    “…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
  8. 828
  9. 829
  10. 830
  11. 831

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 832
  13. 833
  14. 834

    Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice by Turker Tuncer (16677966)

    Published 2020
    “…Our approach is a simple and efficient voice-based algorithm in which a multi-center and multi threshold based ternary pattern is used (MCMTTP). …”
  15. 835

    Identification of physically based models of residential air-conditioners for direct load control management by El-Ferik, S.

    Published 2004
    “…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …”
    Get full text
    Get full text
    article
  16. 836
  17. 837

    Determination Of The Optimal Process Means And Production Cycles For Multistage Production Systems Subject To Process Deterioration by Al-Sultan, K.S.

    Published 2020
    “…The model rinds optimal initial settings of the process means and optimal cycle lengths. A Hook and Jeeves search algorithm is used to optimize the model, and a numerical example is provided. …”
    Get full text
    article
  18. 838

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
  19. 839

    Spacecraft spin axis attitude determination by Emara-Shabaik, H.E.

    Published 1992
    “…Two algorithms are developed and compared by simulation. …”
    Get full text
    Get full text
    article
  20. 840

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject