Search alternatives:
processing algorithm » processing algorithms (Expand Search)
based control » case control (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
Showing 321 - 340 results of 570 for search '(( element rd algorithm ) OR ((( based control algorithm ) OR ( data processing algorithm ))))', query time: 0.13s Refine Results
  1. 321

    Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…In this paper, we first propose a novel lightweight location service that permits to discover all the geographical paths between two vehicles based on smart mobile agents. Second, we proposed ARGENT an Agent-Based Reactive Geographic Routing Protocol that couples the routing process with the novel lightweight location service. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 322

    Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering by Saadia Jamil (22045946)

    Published 2024
    “…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
  3. 323
  4. 324
  5. 325
  6. 326
  7. 327

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems by Agushaka, Jeffrey O.

    Published 2022
    “…This optimization technique modifies the base algorithm (DMO) in three simple but effective ways. …”
    Get full text
  8. 328
  9. 329
  10. 330

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …”
    Get full text
  11. 331
  12. 332
  13. 333

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  14. 334

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  15. 335

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 336
  17. 337

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  18. 338
  19. 339

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…XACML (eXtensible Access Control Markup Language) policies, which are widely adopted for defining and controlling dynamic access among Web/cloud services, are becoming more complex in order to handle the significant growth in communication and cooperation between individuals and composed services. …”
    Get full text
    Get full text
    Get full text
    article
  20. 340