Showing 141 - 160 results of 236 for search '(( element scheduling algorithm ) OR ((( data code algorithm ) OR ( based findings algorithm ))))', query time: 0.12s Refine Results
  1. 141

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Ayesh Marabeh (21142247)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  2. 142

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 143

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 144

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…<p>This paper presents a design optimization algorithm for series-series compensated Inductive Power Transfer (IPT) system based on flat spiral coils, considering bifurcation phenomenon and AC equivalent resistance of the coils. …”
  5. 145

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs by Kouatli, Issam

    Published 2008
    “…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 146

    A collaborative filtering recommendation framework utilizing social networks by Aamir Fareed (17019087)

    Published 2023
    “…The current study proposes a collaborative filtering recommendation framework that employs social networks to generate more precise and pertinent recommendations. The framework is based on a modified version of the user-based collaborative filtering algorithm, which computes user similarity based on their ratings and social connections. …”
  7. 147

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  8. 148

    An evolutionary approach to load balancing parallel computations by Mansour, Nashat

    Published 1991
    “…We present a new approach to balancing the workload in a multicomputer. It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 149

    Data Generation for Path Testing by Mansour, Nashat

    Published 2004
    “…These algorithms are based on an optimization formulation of the path testing problem which include both integer- and real-value test cases. …”
    Get full text
    Get full text
    Get full text
    article
  10. 150
  11. 151

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…Our algorithm performs better than previous algorithms by finding lower energy structures or by performing fewer numbers of energy evaluations.…”
    Get full text
    Get full text
    Get full text
    article
  12. 152
  13. 153

    A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand by Khawar Naeem (17984062)

    Published 2023
    “…The solution approaches included the genetic algorithm (GA), particle swarm optimization (PSO), and the non-dominated sorting genetic algorithm (NSGA-II). …”
  14. 154
  15. 155

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  16. 156

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 157

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …”
  18. 158

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  19. 159

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  20. 160

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”