Search alternatives:
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 221 - 240 results of 895 for search '(( data using algorithms ) OR ((( develop based algorithm ) OR ( elements data algorithm ))))*', query time: 0.14s Refine Results
  1. 221

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…We evaluate our algorithm on proteins taken from a Protein Data Bank. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 222
  3. 223

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
    Get full text
  4. 224

    A comparison of optimization heuristics for the data mapping problem by Mansour, Nashat

    Published 1997
    “…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  5. 225

    Multiobjective Evolutionary Algorithms for Electric Power Dispatch Problem by Abido, M. A.

    Published 2006
    “…The potential and effectiveness of the newly developed Pareto-based multiobjective evolutionary algorithms (MOEA) for solving a real-world power system multiobjective nonlinear optimization problem are comprehensively discussed and evaluated in this paper. …”
    Get full text
    article
  6. 226

    Multiobjective evolutionary algorithms for electric power dispatch problem by Abido, M.A.

    Published 2006
    “…The potential and effectiveness of the newly developed Pareto-based multiobjective evolutionary algorithms (MOEA) for solving a real-world power system multiobjective nonlinear optimization problem are comprehensively discussed and evaluated in this paper. …”
    Get full text
    Get full text
    article
  7. 227
  8. 228

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
  9. 229

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 230
  11. 231
  12. 232
  13. 233
  14. 234

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
    Get full text
    Get full text
  15. 235

    Optimizing MPPT Control for Enhanced Efficiency in Sustainable Photovoltaic Microgrids: A DSO-Based Approach by Debabrata Mazumdar (18560506)

    Published 2024
    “…In the context of solar photovoltaic systems connected with DC microgrid platforms, this study introduces a recently developed drone squadron optimization (DSO) scheme that tracks the global maximum power point under PSCS difficulties. …”
  16. 236
  17. 237

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…The embedded controller is microprocessor based, which provides the designer with the advantage of using a highly-integrated processor and the ability to develop the software needed…”
    Get full text
    Get full text
    article
  18. 238

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
  19. 239
  20. 240

    A fast exact sequential algorithm for the partial digest problem by Mostafa M. Abbas (17058093)

    Published 2016
    “…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”