Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 441 - 460 results of 634 for search '(( elements method algorithm ) OR ((( data based algorithm ) OR ( data processing algorithm ))))', query time: 0.13s Refine Results
  1. 441

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 442

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 443
  4. 444

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
  5. 445

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 446
  7. 447
  8. 448

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO by Majedeh Gheytanzadeh (17541927)

    Published 2022
    “…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
  9. 449
  10. 450

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  11. 451

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 452

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 453

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 454

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 455

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben Romdhane, Haifa

    Published 2023
    “…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
    Get full text
  16. 456

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article
  17. 457
  18. 458

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …”
  19. 459

    SemIndex: Semantic-Aware Inverted Index by Chbeir, Richard

    Published 2017
    “…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 460

    Information Warfare by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject