Search alternatives:
developing robust » developing 21st (Expand Search)
using algorithms » cosine algorithm (Expand Search)
robust algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 181 - 200 results of 727 for search '(( data using algorithms ) OR ((( developing robust algorithm ) OR ( element data algorithm ))))', query time: 0.15s Refine Results
  1. 181

    A comparison of optimization heuristics for the data mapping problem by Mansour, Nashat

    Published 1997
    “…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  2. 182

    Social spider optimization algorithm: survey and new applications by Abualigah, Laith

    Published 2024
    “…Finally, this chapter provides an expectation of the fields that need to work with this algorithm to improve problem-solving and the fields that have a growing number studies that use this algorithm.…”
    Get full text
  3. 183

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
  4. 184

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 185
  6. 186
  7. 187

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
    Get full text
    Get full text
  8. 188
  9. 189

    A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition by Hanif Heidari (22467148)

    Published 2025
    “…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …”
  10. 190
  11. 191

    A fast exact sequential algorithm for the partial digest problem by Mostafa M. Abbas (17058093)

    Published 2016
    “…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
  12. 192

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  13. 193

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
    Get full text
  14. 194

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…Among these, K-means is widely used for efficiently solving clustering problems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 195
  16. 196
  17. 197

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir (20748764)

    Published 2024
    “…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”
  18. 198

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
    Get full text
    Get full text
  19. 199

    Advancing Data Center Networks: A Focus on Energy and Cost Efficiency by Zina Chkirbene (16869987)

    Published 2023
    “…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
  20. 200

    Revolutionizing sustainable supply chain management: A review of metaheuristics by Abualigah, Laith

    Published 2023
    “…The paper also identifies the key factors that influence the success of using metaheuristics for SSCM, such as the choice of algorithm, problem complexity, and data quality. …”
    Get full text