Showing 1 - 20 results of 21 for search '(( elements matching algorithm ) OR ((( elements mesh algorithm ) OR ( movement data algorithm ))))', query time: 0.12s Refine Results
  1. 1

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  2. 2

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
    Get full text
  3. 3

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. by Sebastian Kruse (18595195)

    Published 2020
    “…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
  4. 4
  5. 5

    Towards Scalable Process Mining Pipelines by Mohamed, Belal

    Published 2023
    “…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …”
    Get full text
    Get full text
    Get full text
  6. 6

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  7. 7
  8. 8
  9. 9
  10. 10

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…In an attempt to overcome this difficulty, we present a survey and comparison of wormhole routing techniques in mesh interconnection networks. The mesh topology is important because of its scalability. …”
    Get full text
    Get full text
    article
  11. 11

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…In this paper, we propose an algorithm for measuring the structural similarity between an XML document and a Document Type Definition (DTD) considered as the simplest way for specifying structural constraints on XML documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 12
  13. 13
  14. 14

    A quadratic kernel for 3-set packing by Abu-Khzam, Faisal N.

    Published 2017
    “…Such parameterized reductions are known as kernelization algorithms, and each reduced instance is called a problem kernel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15

    Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks by Sharma, Neetan

    Published 2023
    “…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
    Get full text
  16. 16

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…The assessment input for the automation algorithms were predominantly hand movement. Around 37.5 % (<i>n </i>= 15) of the studies assessed algorithm performance using classification accuracy. …”
  17. 17
  18. 18

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”
  19. 19

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 20

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article