Showing 161 - 180 results of 241 for search '(( elements means algorithm ) OR ((( data code algorithm ) OR ( based finding algorithm ))))', query time: 0.13s Refine Results
  1. 161

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  2. 162

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING by Sait, Sadiq M.

    Published 2020
    “…In this paper we employ two iterative heuristics for the optimization of VLSI Netlist Bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) [sadiq et al., 1999] respectively. …”
    Get full text
    article
  3. 163
  4. 164
  5. 165

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  6. 166
  7. 167

    General iterative heuristics for VLSI multiobjective partitioning by Sait, Sadiq M.

    Published 2003
    “…In this paper, we engineer two iterative heuristics for the optimization of VLSI netlist bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
    Get full text
    Get full text
    article
  8. 168

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…There have been great improvements in web technology over the past years which heavily loaded the Internet with various digital contents of different fields. This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
    Get full text
  9. 169

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 170

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…Research limitations/implications The stemming algorithm can be further enhanced. In the Arabic language, we have many grammatical rules. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 171

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …”
    Get full text
    Get full text
    Get full text
    article
  12. 172

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
    Get full text
  13. 173

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  14. 174

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  15. 175

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  16. 176

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  17. 177

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation by Saqr Khalil Saeed Thabet (19517560)

    Published 2022
    “…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
  18. 178

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
    Get full text
    Get full text
    Get full text
    article
  19. 179

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 180

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …”