بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
يعرض 121 - 140 نتائج من 540 نتيجة بحث عن '(( elements method algorithm ) OR ((( data based algorithm ) OR ( task scheduling algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 121
  2. 122

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  3. 123

    Robust control of sampled data systems حسب Al-Sunni, F.M.

    منشور في 1998
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are given for demonstration…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 124

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  5. 125

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  6. 126

    Bee Colony Algorithm for Proctors Assignment. حسب Mansour, Nashat

    منشور في 2015
    "…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 127

    Stochastic Search Algorithms for Exam Scheduling حسب Mansour, Nashat

    منشور في 2007
    "…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 128
  9. 129

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... حسب Mohamed, AlShuweihi

    منشور في 2020
    "…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
    احصل على النص الكامل
  10. 130

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 131

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  12. 132

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  13. 133
  14. 134

    A kernelization algorithm for d-Hitting Set حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 135

    Particle swarm optimization algorithm: review and applications حسب Abualigah, Laith

    منشور في 2024
    "…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …"
    احصل على النص الكامل
  16. 136

    Scatter Search algorithm for Protein Structure Prediction حسب Mansour, Nashat

    منشور في 2016
    "…In this paper, we present a Scatter Search (SS) algorithm for predicting 3D structures of proteins based on torsion angles representation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 137
  18. 138
  19. 139
  20. 140

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل