يعرض 81 - 100 نتائج من 125 نتيجة بحث عن '(( elements jaya algorithm ) OR ((( data code algorithm ) OR ( case finding algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 81

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids حسب Sadah Mohammed (18192859)

    منشور في 2024
    "…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…"
  2. 82

    Evacuation of a highly congested urban city حسب El Khoury, John

    منشور في 2017
    "…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 83

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 84

    Recovery of business intelligence systems حسب Haraty, Ramzi A.

    منشور في 2018
    "…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 85

    ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields حسب El-Kassar, A. N.

    منشور في 2005
    "…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 86

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
  7. 87

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches حسب Abdulla Alhajeri, Rashed

    منشور في 2020
    "…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …"
    احصل على النص الكامل
    احصل على النص الكامل
  8. 88

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy حسب El-Ferik, S

    منشور في 2020
    "…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …"
    احصل على النص الكامل
    article
  9. 89

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) حسب Elaine Beller (44602)

    منشور في 2018
    "…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
  10. 90

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  11. 91
  12. 92

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 93

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  14. 94

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  15. 95

    An efficient method for the open-shop scheduling problem using simulated annealing حسب Harmanani, Haidar M.

    منشور في 2016
    "…Experimental results show that the algorithm performs well on the benchmarks. The algorithm was able to find an optimum solution in many cases.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 96

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  17. 97

    QoS-driven multicast tree generation using tabu search حسب Youssef, H.

    منشور في 2020
    "…Results show that on almost all test cases, TS algorithm exhibits more intelligent search of the solution subspace and is able to find better solutions than other reported multicast algorithms.…"
    احصل على النص الكامل
    article
  18. 98

    The maximum common subgraph problem حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…With its plethora of applications, MCS is a familiar and challenging problem. Many algorithms exist that can deliver optimal MCS solutions, but whose asymptotic worst-case run times fail to do better than mere brute-force, which is exponential in the order of the smaller graph. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 99

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …"
  20. 100

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices حسب Samir, Moataz

    منشور في 2019
    "…Next, we propose an extension algorithm to further minimize the UAV’s flight distance for cases where the initial and final UAV locations are known a priori. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article