Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 181 - 200 results of 634 for search '(( elements method algorithm ) OR ((( data based algorithm ) OR ( data processing algorithm ))))', query time: 0.14s Refine Results
  1. 181
  2. 182

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
    Get full text
  3. 183

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …”
  4. 184
  5. 185

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
    Get full text
    article
  6. 186

    Robust control of sampled data systems by Al-Sunni, F.M.

    Published 1998
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are given for demonstration…”
    Get full text
    Get full text
    article
  7. 187

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
    Get full text
    article
  8. 188

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…”
    Get full text
    article
  9. 189

    Stochastic Search Algorithms for Exam Scheduling by Mansour, Nashat

    Published 2007
    “…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
    Get full text
    Get full text
    article
  10. 190
  11. 191

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 192

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
  13. 193
  14. 194

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  15. 195

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  16. 196

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  17. 197
  18. 198

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
    Get full text
  19. 199

    Scatter Search algorithm for Protein Structure Prediction by Mansour, Nashat

    Published 2016
    “…In this paper, we present a Scatter Search (SS) algorithm for predicting 3D structures of proteins based on torsion angles representation. …”
    Get full text
    Get full text
    Get full text
    article
  20. 200