Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 994 for search '(( element data algorithm ) OR ((( data processing algorithm ) OR ( systems using algorithm ))))*', query time: 0.14s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164

    The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers by Albert Al Touma (17302768)

    Published 2021
    “…The optimization of the system parameters is expected to overcome the limitations of using evaporative coolers in humid countries. …”
  5. 165

    A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System by Muhammad Asim (2235472)

    Published 2021
    “…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …”
  6. 166
  7. 167
  8. 168

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  9. 169
  10. 170
  11. 171

    A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services by Al-Qahtani, Salman

    Published 2005
    “…The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …”
    Get full text
    Get full text
    article
  12. 172

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  13. 173

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control by Abu Zitar, Raed

    Published 2022
    “…The initial statistical and convergence profile assessment showed better performance of the proposed algorithm. The comparative analyses for transient and frequency responses were performed for the PID-controlled FES system using the original AOA, sine–cosine and particle swarm optimization algorithms and the traditional Ziegler-Nichols tuning scheme. …”
  14. 174

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments by Mohammadhasan Faghihi (22303057)

    Published 2024
    “…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …”
  15. 175

    Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018) by Tay, Bilal M.

    Published 2018
    “…Companies, nowadays, rely on systems and applications to automate their business processes and data management. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 176
  17. 177
  18. 178

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure by Mouna Rabhi (17086969)

    Published 2024
    “…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. …”
  19. 179
  20. 180