Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
Showing 281 - 300 results of 619 for search '(( element search algorithm ) OR ((( data processing algorithm ) OR ( designed using algorithm ))))', query time: 0.13s Refine Results
  1. 281

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  2. 282
  3. 283

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text
  4. 284
  5. 285

    Performance driven standard-cell placement using the geneticalgorithm by Youssef, H.

    Published 1995
    “…In this paper we present a timing-driven placer for standard-cell IC design. The placement algorithm follows the genetic paradigm. …”
    Get full text
    Get full text
    article
  6. 286
  7. 287

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
  8. 288
  9. 289
  10. 290
  11. 291

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
    Get full text
    Get full text
    Get full text
  12. 292

    Matheuristic Fixed Set Search Applied to the Two-Stage Capacitated Facility Location Problem by Denis Alicic (23073484)

    Published 2025
    “…In addition, this work introduces geographically realistic instances—beyond the synthetic datasets used in previous research—and demonstrates that these experiments reveal regional cost dependencies and spatial utilization patterns, underscoring the practical value of MFSS in supporting real-world distribution network design. …”
  13. 293

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
    Get full text
    article
  14. 294

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
  15. 295

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 296

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …”
  17. 297
  18. 298

    FPGA-Based Network Traffic Classification Using Machine Learning by Elnawawy, Mohammed

    Published 2020
    “…Further, and since software-based classifiers cannot meet the anticipated real-time requirements, we propose a Field-Programmable Gate Array (FPGA) based random forest implementation that utilizes a highly pipelined architecture to accelerate such a time-consuming task. The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…”
    Get full text
    article
  19. 299

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 300

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”