Search alternatives:
developing rapid » developing a (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rapid algorithm » rd algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 201 - 220 results of 719 for search '(( data using algorithm ) OR ((( developing rapid algorithm ) OR ( relevant data algorithm ))))*', query time: 0.17s Refine Results
  1. 201
  2. 202

    Convergence and steady-state analysis of the normalized least mean fourth algorithm by Zerguine, Azzedine

    Published 2007
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    article
  3. 203

    Convergence and steady-state analysis of the normalized least mean fourth algorithm by Zerguine, Azzedine

    Published 2007
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    Get full text
    article
  4. 204
  5. 205

    A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models by Azar, Danielle

    Published 2010
    “…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
    Get full text
    Get full text
    Get full text
    article
  6. 206

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
    Get full text
    Get full text
    article
  7. 207

    The buffered work-pool approach for search-tree based optimization algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 208

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
  9. 209

    Advancing Data Center Networks: A Focus on Energy and Cost Efficiency by Zina Chkirbene (16869987)

    Published 2023
    “…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
  10. 210
  11. 211

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
    Get full text
  12. 212

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
  13. 213

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
  14. 214

    A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition by Hanif Heidari (22467148)

    Published 2025
    “…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …”
  15. 215

    LaScaDa: A Novel Scalable Topology for Data Center Network by Zina Chkirbene (16869987)

    Published 2020
    “…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”
  16. 216

    Heat rate curve approximation for power plants without data measuring devices by Poullikkas, Andreas

    Published 2012
    “…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
    Get full text
    article
  17. 217

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…The global evolution of wireless technologies and intelligent sensing devices are transforming the realization of smart cities. Among the myriad of use cases, there is a need to support applications whereby low-resource Internet of Things (IoT) devices need to upload their sensor data to a remote control centre by target hard deadlines; otherwise, the data becomes outdated and loses its value, for example, in emergency or industrial control scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 218

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. by Sebastian Kruse (18595195)

    Published 2020
    “…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
  19. 219
  20. 220

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text