يعرض 521 - 540 نتائج من 785 نتيجة بحث عن '(( data using algorithms ) OR ((( develop new algorithm ) OR ( elements method algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 521

    Dataset built for Arabic Sentiment Analysis حسب AL MUKHAITI, AYESHA JUMAA SALEM

    منشور في 2016
    "…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
    احصل على النص الكامل
  2. 522
  3. 523

    Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems حسب J. Prasanth Ram (19499062)

    منشور في 2022
    "…The occurrence of multiple power peaks and their location are highly uncertain in PV systems; this necessitates the use of complex maximum power point tracking algorithms to introduce high voltage oscillations. To address this issue, a new reconfigurable PV array to produce a global maximum power point (GMPP) algorithm close to the Voc regions was introduced. …"
  4. 524

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects حسب ALKAABI, ABDULLA

    منشور في 2023
    "…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …"
    احصل على النص الكامل
  5. 525

    Process Mining over Unordered Event Streams حسب Awad, Ahmed

    منشور في 2020
    "…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  6. 526

    Multi-Classifier Tree With Transient Features for Drift Compensation in Electronic Nose حسب Atiq Ur Rehman (8843024)

    منشور في 2020
    "…These electronic instruments rely on Machine Learning (ML) algorithms for recognizing the sensed odors. The effect of long-term drift influences the performance of ML algorithms and the models those are trained on drift free data fail to perform on the drifted data. …"
  7. 527

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  8. 528

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 529
  10. 530

    MoveSchedule حسب Zouein, Pierette

    منشور في 1995
    "…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 531

    Radar Pulse Interleaving For Multi-Target Tracking حسب Elshafei, M.

    منشور في 2020
    "…In a multifunction radar, the maximum number of targets that can be managed or tracked is an important performance measure. Interleaving algorithms developed to operate radars exploit the dead-times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. …"
    احصل على النص الكامل
    article
  12. 532
  13. 533

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 534

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant حسب ALMutawa, J.

    منشور في 2007
    "…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 535

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 536
  17. 537
  18. 538

    Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications حسب Hussie, Abdelazim

    منشور في 2022
    "…The literature review paper includes deep insight about possible future directions and possible ideas worth investigations regarding the new variants of the HHO algorithm and its widespread applications.…"
    احصل على النص الكامل
  19. 539

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 540

    Innovative mobile E-healthcare systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article