Showing 121 - 140 results of 142 for search '(( element data algorithm ) OR ((( present selection algorithm ) OR ( neural coding algorithm ))))*', query time: 0.11s Refine Results
  1. 121
  2. 122

    Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques by Abd-El-Barr, Mostafa

    Published 2003
    “…Topological optimization of computer networks is concerned with the selection of a subset of the available links such that the reliability and fault-tolerance aspects are maximized while meeting a cost constraint. …”
    Get full text
    Get full text
    article
  3. 123
  4. 124

    Design and simulation of superdirective adaptive antenna arrays by Dawoud, M.M.

    Published 1990
    “…The commonly used adaptive algorithms were compared and the LMS (least mean square) algorithm was selected for the simulation of the adaptive array system. …”
    Get full text
    Get full text
    article
  5. 125

    Fragment based protein structure prediction. (c2013) by Terzian, Meghrig Ohanes

    Published 2016
    “…Backbone fragments selections extracted from the Robetta server are followed by side chain selections, extracted from the Dunbrack Library. …”
    Get full text
    Get full text
    masterThesis
  6. 126

    Local convexity preserving rational cubic spline curves by Sarfraz, M.

    Published 1997
    “…An algorithm is presented which constructs a curve by interpolating the given data points. …”
    Get full text
    Get full text
    article
  7. 127

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  8. 128

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
    Get full text
    Get full text
  9. 129

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability by Abd-El-barr, Mostafa

    Published 2003
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
    Get full text
    article
  10. 130

    Reliability and fault tolerance based topological optimization of computer networks - part I: enumerative techniques by Abd-El-Barr, Mostafa

    Published 2003
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using existing techniques. …”
    Get full text
    Get full text
    article
  11. 131

    Dynamic Layout Planning Using a Hybrid Incremental Solution Method by Zouein, Pierrette

    Published 1999
    “…A dynamic layout construction procedure is presented here. Construction resources, represented as rectangles, are subjected to two-dimensional geometric constraints on relative locations. …”
    Get full text
    Get full text
    Get full text
    article
  12. 132
  13. 133
  14. 134

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations by Abbas, Nadine Fawaz

    Published 2017
    “…We demonstrate their e↵ectiveness by presenting performance results and analysis for a wide range of network scenarios.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 135

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…The contributions of the paper are four fold: (i) generating an optimized block distribution scheme among the nodes of a given data center for fixed and variable size blocks; (ii) optimization of storage allocation under dynamic environments with data block arrivals; (iii) optimization of storage allocation with newly added storage nodes; and (iv) generating an effective block distribution scheme among the nodes by accounting for varying priorities among data blocks. We present a wide range of results for the various proposed algorithms and considered scenarios to quantify the achievable performance gains.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 136

    Precision nutrition: A systematic literature review by Daniel Kirk (17302798)

    Published 2021
    “…In total, 30 algorithms were used, with 19 appearing more than once. …”
  17. 137

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  18. 138

    An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks by Mohammad Zain Ul Abideen (16904637)

    Published 2022
    “…Therefore, it is imperative to account for these adverse effects of the integration of DERs on the distribution network and minimize their impact when calculating the Hosting Capacity (HC). Two algorithms are presented in this study derived from a novel modified iterative method and a novel Repeated Particle Swarm Optimization (RPSO) method for determining the HC for multiple DER units simultaneously or a single DER unit integrating into radial or mesh networks. …”
  19. 139

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. …”
  20. 140

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
    Get full text
    Get full text
    Get full text
    masterThesis