Search alternatives:
method algorithm » mould algorithm (Expand Search)
Showing 61 - 80 results of 634 for search '(( elements method algorithm ) OR ((( data based algorithm ) OR ( data processing algorithms ))))', query time: 0.12s Refine Results
  1. 61

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems by Boukhari, Bahia

    Published 2019
    “…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 62
  3. 63

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 64

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …”
  5. 65

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
    Get full text
    Get full text
    Get full text
    article
  6. 66

    Data reductions and combinatorial bounds for improved approximation algorithms by Abu-Khzam, Faisal N.

    Published 2016
    “…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 67

    Allocating data to distributed-memory multiprocessors by genetic algorithms by Mansour, Nashat

    Published 2016
    “…We present three genetic algorithms (GAs) for allocating irregular data sets to multiprocessors. …”
    Get full text
    Get full text
    Get full text
    article
  8. 68

    A Fast and Robust Gas Recognition Algorithm Based on Hybrid Convolutional and Recurrent Neural Network by Xiaofang Pan (1895950)

    Published 2019
    “…In order to address this issue, in this paper, we propose a novel hybrid approach with both convolutional and recurrent neural networks combined, which is based on the long short-term memory module. Featuring the capability of learning the correlations of time-series data, the proposed deep learning method is well-suited for extracting the valuable transient feature contained in the very beginning of the response curve. …”
  9. 69

    Editorial on the Special Section on Algorithms, Circuits, and Systems for Signal Processing at the Edge by Leonel Sousa (19645372)

    Published 2021
    “…<p dir="ltr">Technological trends alongside with the unprecedented growth of the data generated by devices sparsely distributed, most of them mobile devices, cannot be supported by traditional approaches and processing systems. …”
  10. 70
  11. 71

    Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems by Haraty, Ramzi A.

    Published 2016
    “…Hence, this presents a need for fast and efficient damage assessment and recovery algorithms. In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 72
  13. 73

    Variable Selection in Data Analysis: A Synthetic Data Toolkit by Mitra, Rohan

    Published 2024
    “…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
    Get full text
    article
  14. 74
  15. 75

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…The proposed method, named Eye-means, emulates the natural ocular process of estimating initial centroids. To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 76

    Big Data Energy Management, Analytics and Visualization for Residential Areas by Gupta, Ragini

    Published 2020
    “…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
    Get full text
    article
  17. 77
  18. 78

    Parallel physical optimization algorithms for allocating data to multicomputer nodes by Mansour, Nashat

    Published 1994
    “…Three parallel physical optimization algorithms for allocating irregular data to multicomputer nodes are presented. …”
    Get full text
    Get full text
    Get full text
    article
  19. 79

    Physical optimization algorithms for mapping data to distributed-memory multiprocessors by Mansour, Nashat

    Published 1992
    “…We present three parallel physical optimization algorithms for mapping data to distributed-memory multiprocessors, concentrating on irregular loosely synchronous problems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 80

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”