بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 561 - 580 نتائج من 728 نتيجة بحث عن '(( element method algorithm ) OR ((( data processing algorithm ) OR ( based method algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 561

    An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks حسب Md Moktadir Rahman (16904751)

    منشور في 2022
    "…An improved hybrid particle swarm optimization algorithm (IHPSO) is proposed for the load controller to provide fast convergence and robust optimization results. …"
  2. 562

    High-order parametrization of the hypergeometric-Meijer approximants حسب Abouzeid M. Shalaby (16329062)

    منشور في 2023
    "…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …"
  3. 563

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…The proposed procedure exploits a more effective model selection criteria to generate <i>p</i>-values for statistical significance and is more efficient in terms of computational time and prediction accuracy than literature methods. Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…"
  4. 564
  5. 565

    Accurate multiple network alignment through context-sensitive random walk حسب Hyundoo Jeong (3840013)

    منشور في 2015
    "…Performance evaluation based on synthetic networks as well as real protein-protein interaction networks shows that the proposed algorithm can construct more accurate multiple network alignments compared to other leading methods.…"
  6. 566

    Particle swarm optimization approach for protein structure prediction in the 3D HP model حسب Mansour, Nashat

    منشور في 2012
    "…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 567
  8. 568
  9. 569

    Online dynamic ensemble deep random vector functional link neural network for forecasting حسب Ruobin Gao (16003195)

    منشور في 2023
    "…Then, an online learning algorithm is designed to learn the edRVFL. Finally, an online dynamic ensemble method, which can measure the change in the distribution, is proposed for aggregating all layers’ outputs. …"
  10. 570

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks حسب Mohamed Amjath (17542512)

    منشور في 2022
    "…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …"
  11. 571

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2015
    "…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 572

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 573

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  14. 574
  15. 575

    Optimal supercharge scheduling of electric vehicles حسب Atallah, Ribal F.

    منشور في 2018
    "…The distributed game-theoretical approach recorded promising results especially when compared to the well-known shortest job first scheduling algorithm. Further, unlike the other approaches, which normally are centralized and suited for offline scheduling, the game-based method is suited for online scheduling since it played at anytime a batch of EVs requests charging services. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 576
  17. 577

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 578

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  19. 579

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature حسب Saif, Badran

    منشور في 2022
    "…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 580

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…In the proposed method, the chaotic variables are governed by cryptographic keys, crucial in generating data sequences. …"