Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 561 - 580 results of 728 for search '(( element method algorithm ) OR ((( data processing algorithm ) OR ( based method algorithm ))))*', query time: 0.11s Refine Results
  1. 561

    An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks by Md Moktadir Rahman (16904751)

    Published 2022
    “…An improved hybrid particle swarm optimization algorithm (IHPSO) is proposed for the load controller to provide fast convergence and robust optimization results. …”
  2. 562

    High-order parametrization of the hypergeometric-Meijer approximants by Abouzeid M. Shalaby (16329062)

    Published 2023
    “…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …”
  3. 563

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…The proposed procedure exploits a more effective model selection criteria to generate <i>p</i>-values for statistical significance and is more efficient in terms of computational time and prediction accuracy than literature methods. Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  4. 564
  5. 565

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…Performance evaluation based on synthetic networks as well as real protein-protein interaction networks shows that the proposed algorithm can construct more accurate multiple network alignments compared to other leading methods.…”
  6. 566

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
    Get full text
    Get full text
    Get full text
    article
  7. 567
  8. 568
  9. 569

    Online dynamic ensemble deep random vector functional link neural network for forecasting by Ruobin Gao (16003195)

    Published 2023
    “…Then, an online learning algorithm is designed to learn the edRVFL. Finally, an online dynamic ensemble method, which can measure the change in the distribution, is proposed for aggregating all layers’ outputs. …”
  10. 570

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
  11. 571

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 572

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 573

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  14. 574

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 575

    Optimal supercharge scheduling of electric vehicles by Atallah, Ribal F.

    Published 2018
    “…The distributed game-theoretical approach recorded promising results especially when compared to the well-known shortest job first scheduling algorithm. Further, unlike the other approaches, which normally are centralized and suited for offline scheduling, the game-based method is suited for online scheduling since it played at anytime a batch of EVs requests charging services. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 576
  17. 577

    Information Warfare by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 578

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  19. 579

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif, Badran

    Published 2022
    “…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …”
    Get full text
    Get full text
    Get full text
    article
  20. 580

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…In the proposed method, the chaotic variables are governed by cryptographic keys, crucial in generating data sequences. …”