Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
Showing 121 - 140 results of 620 for search '(( elements method algorithm ) OR ((( data detection algorithm ) OR ( based methods algorithm ))))', query time: 0.15s Refine Results
  1. 121

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  2. 122
  3. 123

    Bee Colony Algorithm for Proctors Assignment. by Mansour, Nashat

    Published 2015
    “…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
    Get full text
    Get full text
    Get full text
    article
  4. 124

    Scalable Parallel Algorithms for FPT Problems by Abu-Khzam, Faisal N.

    Published 2006
    “…Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems of significance. …”
    Get full text
    Get full text
    Get full text
    article
  5. 125

    Improvement Algorithm for Limited Space Scheduling by Zouein, Pierrette

    Published 2001
    “…The model characterizes resource space requirements over time and establishes a time-space relationship for each activity in the schedule, based on alternative resource levels. An example illustrates the presented algorithm that generates a feasible space schedule.…”
    Get full text
    Get full text
    article
  6. 126

    Approximation algorithms inspired by kernelization nethods by Abu-Khzam, Faisal N.

    Published 2017
    “…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of reduction rules and combinatorial insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 127
  8. 128
  9. 129

    A new method of analysis for slender columns by Zdenek, P.

    Published 1991
    “…The method consists of a simple incremental-loading algorithm that traces the load-deflection curve at constant eccentricity of the axial load. …”
    Get full text
    Get full text
    article
  10. 130

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 131

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  12. 132

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Mara'Beh (17337892)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  13. 133

    An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications by Abu Zitar, Raed

    Published 2021
    “…In this review paper, JAYA algorithm, which is a recent population-based algorithm is intensively overviewed. …”
    Get full text
  14. 134

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
    Get full text
  15. 135

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  16. 136

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  17. 137

    Parallel Algorithm for Hardware Implementation of Inverse Halftoning by Siddiqi, Umair F.

    Published 2005
    “…The algorithm is based on Lookup Tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
    Get full text
    article
  18. 138

    Parallel algorithm for hardware implementation of inverse halftoning by Siddiqi, U.F.

    Published 2005
    “…The algorithm is based on lookup tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
    Get full text
    Get full text
    article
  19. 139

    Trial-based dominance for comparing both the speed and accuracy of stochastic optimizers with standard non-parametric tests by Kenneth V. Price (17877002)

    Published 2023
    “…This paper describes how trial-based dominance can totally order this two-variable dataset of outcomes so that traditional non-parametric methods can determine the better of two algorithms when one is faster, but less accurate than the other, i.e. when neither algorithm dominates. …”
  20. 140