Showing 761 - 780 results of 1,011 for search '(( data using algorithm ) OR ((( developing a algorithm ) OR ( elements datrd algorithm ))))', query time: 0.10s Refine Results
  1. 761

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis by Ghada Al-Hussain (18295426)

    Published 2022
    “…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …”
  2. 762

    Indoor Localization Based on Floor Plans and Power Maps by Khalifeh, Joe J.

    Published 2015
    “…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 763

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 764
  5. 765

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem by Tao Li (86810)

    Published 2025
    “…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
  6. 766
  7. 767
  8. 768
  9. 769
  10. 770

    An optimal stochastic multivariable PID controller by Saab, Samer S.

    Published 2019
    “…The system under consideration needs not be stable. A recursive algorithm providing optimal time-varying PID gains is proposed for the case where the number of inputs is larger than or equal to the number of outputs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 771

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 772

    Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems by J. Prasanth Ram (19499062)

    Published 2022
    “…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. …”
  13. 773

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
  14. 774

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism by Aisha Nasser J. M. Al-Saei (17885957)

    Published 2023
    “…<p dir="ltr">Autism Spectrum Disorder (ASD) is a common neurodevelopmental disorder in children. …”
  15. 775

    An aspect-oriented framework for systematic security hardening of software by Mourad, Azzam

    Published 2008
    “…We realize our proposition by integrating into the GCC compiler few features described in the SHL weaving semantics and developing a demonstrative case study…”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 776

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The denoising methodology comprises a computational algorithm to identify significant features in a high-dimensional vector of observations containing white Gaussian noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 777

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 778

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 779
  20. 780