Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 301 - 320 results of 320 for search '(( elements control algorithm ) OR ((( data mining algorithm ) OR ( solved using algorithm ))))', query time: 0.11s Refine Results
  1. 301
  2. 302
  3. 303

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …”
    Get full text
    article
  4. 304

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …”
    Get full text
    Get full text
    article
  5. 305

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
  6. 306

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
  7. 307

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 308

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …”
    Get full text
    Get full text
    masterThesis
  9. 309

    Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques by Abd-El-Barr, Mostafa

    Published 2003
    “…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …”
    Get full text
    Get full text
    article
  10. 310

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  11. 311

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…In this paper, we describe a new approach for XML keyword search aiming to solve the limitations mentioned above. Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 312

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …”
  13. 313
  14. 314
  15. 315

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
    Get full text
    Get full text
    Get full text
    article
  16. 316
  17. 317
  18. 318

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …”
    Get full text
    Get full text
    Get full text
    article
  19. 319

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
  20. 320