بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
يعرض 361 - 380 نتائج من 396 نتيجة بحث عن '(( elements control algorithm ) OR ((( data making algorithm ) OR ( solved using algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 361
  2. 362
  3. 363
  4. 364
  5. 365

    Deepfakes Signatures Detection in the Handcrafted Features Space حسب Hamadene, Assia

    منشور في 2023
    "…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
    احصل على النص الكامل
  6. 366
  7. 367

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 368

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 369

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review حسب Arfan Ahmed (17541309)

    منشور في 2022
    "…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…"
  10. 370

    An efficient cache replacement strategy for the hybrid cache consistency approach حسب Haraty, Ramzi A.

    منشور في 2010
    "…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 371
  12. 372

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance حسب Amr Zeedan (17983750)

    منشور في 2023
    "…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …"
  13. 373

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 374

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 375

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …"
    احصل على النص الكامل
    article
  16. 376

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 377

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…Currently, it is difficult to classify cancers using microarray data. Nearly many data mining techniques have failed because of the small sample size, which has become more critical for organizations. …"
  18. 378

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 379

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
  20. 380

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article