Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
Showing 141 - 160 results of 395 for search '(( elements detection algorithm ) OR ((( data making algorithm ) OR ( solved using algorithm ))))', query time: 0.13s Refine Results
  1. 141
  2. 142
  3. 143

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 144

    A Dynamic Programming Algorithm For Days-Off Scheduling With Sequence Dependent Labor Costs by Elshafei, M

    Published 2020
    “…This paper presents a dynamic programming (DP) algorithm for solving a labor scheduling problem with several realistic days-off scheduling constraints and a cost structure that depends on the work sequence for each employee. …”
    Get full text
    article
  5. 145

    A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System by Muhammad Asim (2235472)

    Published 2021
    “…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …”
  6. 146
  7. 147

    A Parallel Genetic Algorithm for the Geometrically Constrained Site Layout Problem with Unequal-Size Facilities by Zouein, Pierrette P.

    Published 2010
    “…Parallel genetic algorithms techniques have been used in a variety of computer engineering and science areas. …”
    Get full text
    Get full text
    Get full text
    article
  8. 148

    Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem by Nezir Aydin (8355378)

    Published 2024
    “…In this paper, we developed two novel algorithms integrating SAA and PHA for solving the CRFLP under uncertainty. …”
  9. 149

    Fuzzy Logic Adaptive Crow Search Algorithm for MPPT of a Partially Shaded Photovoltaic System by Mohamed Ali Zeddini (22047920)

    Published 2024
    “…<p dir="ltr">The arbitrary selection of the Crow Search Algorithm (CSA) parameters, the Awareness Probability (AP) and the Flight Length (fl) results in poor convergence performance and efficiency even if the CSA performs well when solving global optimization problems. …”
  10. 150

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 151

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
    Get full text
    article
  12. 152

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs by Tarsissi, Lama

    Published 2021
    “…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …”
    Get full text
  13. 153

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
  14. 154
  15. 155

    Revolutionizing sustainable supply chain management: A review of metaheuristics by Abualigah, Laith

    Published 2023
    “…It then introduces the concept of metaheuristics and describes their use in solving complex optimization problems. The paper reviews various metaheuristics algorithms applied to sustainable supply chain management and analyzes their effectiveness in addressing the challenges of SSCM. …”
    Get full text
  16. 156

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  17. 157
  18. 158

    FarmTech: Regulating the use of digital technologies in the agricultural sector by Imad Antoine Ibrahim (14158998)

    Published 2023
    “…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
  19. 159

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …”
  20. 160

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …”