Showing 41 - 60 results of 120 for search '(( elements means algorithm ) OR ((( data code algorithm ) OR ( based mapping algorithm ))))*', query time: 0.13s Refine Results
  1. 41
  2. 42
  3. 43

    Performance evaluation of load balancing algorithms for parallel single-phase iterative PDE solvers by Mansour, N.

    Published 1994
    “…Based on the comparison results, we recommend the use of the simplest and fastest (P/spl times/Q) of the six algorithms considered for sequential compile-time mapping of 2-dimensional meshes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 44

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  5. 45

    Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks by Yaacoub, Elias

    Published 2013
    “…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …”
    Get full text
    Get full text
    Get full text
    article
  6. 46

    Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr... by Elmahdy, Samy

    Published 2020
    “…The approach was developed based on random forest (RF), Kernel logistic regression (KLR), and Naive Bayes Tree machine learning algorithms which use multitemporal Landsat images. …”
    Get full text
    article
  7. 47

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  8. 48
  9. 49

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  10. 50

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …”
  11. 51

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine by Debendra Muduli (20748758)

    Published 2024
    “…In this MOD-POA+ELM algorithm, the modified pelican optimization algorithm (MOD-POA) has been utilized to optimize the parameters of ELM’s hidden neurons. …”
  12. 52
  13. 53
  14. 54

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  15. 55
  16. 56

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 57

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  18. 58
  19. 59

    Novel RFID-Based Pose Estimation Using Single Stationary Antenna by Saab, Samer S.

    Published 2016
    “…Our scheme is based on power map matching algorithm that is capable in estimating the location and orientation of objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 60

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
    Get full text