Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 805 for search '(( element data algorithm ) OR ((( data processing algorithm ) OR ( problem using algorithm ))))*', query time: 0.11s Refine Results
  1. 141
  2. 142
  3. 143
  4. 144

    Power-constrained system-on-a-chip test scheduling using a genetic algorithm by Harmanani, Haidar M.

    Published 2006
    “…This paper presents an efficient approach for the test scheduling problem of core-based systems based on a genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    article
  5. 145

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
    Get full text
    article
  6. 146

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
    Get full text
    article
  7. 147

    A Non-convex Economic Load Dispatch Using Hybrid Salp Swarm Algorithm by Abu Zitar, Raed

    Published 2021
    “…In this paper, the economic load dispatch (ELD) problem with valve point effect is tackled using a hybridization between salp swarm algorithm (SSA) as a population-based algorithm and β-hill climbing optimizer as a single point-based algorithm. …”
    Get full text
  8. 148
  9. 149

    Using out-of-core techniques to produce exact solutions to the maximum clique problem on extremely large graphs by Abu-Khzam, Faisal N.

    Published 2017
    “…Practical methods are presented for computing exact solutions to the maximum clique problem on graphs that are too large to fit within core memory. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 150
  11. 151

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…A corresponding graph realization approach is introduced based on a reduction to the Weighted Edge Cover problem, which in turn is solved using Integer Linear Programming to obtain the best possible solution. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 152
  13. 153
  14. 154

    Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering by Saadia Jamil (22045946)

    Published 2024
    “…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
  15. 155

    FarmTech: Regulating the use of digital technologies in the agricultural sector by Imad Antoine Ibrahim (14158998)

    Published 2023
    “…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
  16. 156
  17. 157

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm by Ghulam Jillani Ansari (16896342)

    Published 2021
    “…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …”
  18. 158

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  19. 159
  20. 160

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text