Search alternatives:
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
-
181
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
182
An evolutionary approach to load balancing parallel computations
Published 1991“…We present a new approach to balancing the workload in a multicomputer. It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …”
Get full text
Get full text
Get full text
conferenceObject -
183
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
184
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
185
EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING
Published 2020“…In this paper we employ two iterative heuristics for the optimization of VLSI Netlist Bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) [sadiq et al., 1999] respectively. …”
Get full text
article -
186
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
187
Final exams scheduling for univeristies. (c2001)
Published 2001Get full text
Get full text
masterThesis -
188
-
189
General iterative heuristics for VLSI multiobjective partitioning
Published 2003“…In this paper, we engineer two iterative heuristics for the optimization of VLSI netlist bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
Get full text
Get full text
article -
190
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…There have been great improvements in web technology over the past years which heavily loaded the Internet with various digital contents of different fields. This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
Get full text
-
191
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
192
Indexing Arabic texts using association rule data mining
Published 2019“…Research limitations/implications The stemming algorithm can be further enhanced. In the Arabic language, we have many grammatical rules. …”
Get full text
Get full text
Get full text
Get full text
article -
193
Scatter search technique for exam timetabling
Published 2011“…In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …”
Get full text
Get full text
Get full text
article -
194
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
Get full text
-
195
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
196
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
197
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
198
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
199
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
Published 2022“…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
-
200
An XML Document Comparison Framework
Published 2001“…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
Get full text
Get full text
Get full text
article