Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
Showing 301 - 320 results of 501 for search '(( elements method algorithm ) OR ((( data finding algorithm ) OR ( designed using algorithm ))))', query time: 0.11s Refine Results
  1. 301

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 302

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem by Tao Li (86810)

    Published 2025
    “…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
  3. 303

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  4. 304

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…This computational framework can expedite and improve the process of finding desirable molecular structures of IL via accurate property predictions in a data-driven manner. …”
  5. 305

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 306

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  7. 307

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  8. 308

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants by Khan, T.

    Published 2006
    “…The use of U-model alleviates the computational complexity of on-line nonlinear controller design that arises when using other modelling frame works such as NARMAX model. …”
    Get full text
    Get full text
    article
  9. 309

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  10. 310

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 311

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  12. 312

    Fast force-directed/simulated evolution hybrid for multiobjective VLSI cell placement by Sait, Sadiq M.

    Published 2004
    “…In this work, a fast hybrid algorithm is designed to address this problem. The algorithm employs simulated evolution (SE), an iterative search heuristic that comprises three steps: evaluation, selection and allocation. …”
    Get full text
    Get full text
    article
  13. 313

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…This research paper introduces the Generalized Continuous Mixed P-Norm Sub-Band Adaptive Filtering (GCMPNSAF) algorithm, designed for efficient online control of Superconducting Magnetic Energy Storage Devices (SMESDs) in Wind Energy Systems (WESs). …”
    Get full text
    Get full text
    Get full text
    article
  14. 314

    A new fuzzy logic controller based IPM synchronous motor drive by Abido, M.A.

    Published 2003
    “…The FLC parameters are optimized by genetic algorithm. The complete vector control scheme incorporating the FLC is successfully implemented in real-time using a digital signal processor board DS 1102 for a laboratory 1 hp interior permanent magnet (IPM) motor. …”
    Get full text
    Get full text
    article
  15. 315

    Reliability and fault tolerance based topological optimization of computer networks - part I: enumerative techniques by Abd-El-Barr, Mostafa

    Published 2003
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using existing techniques. …”
    Get full text
    Get full text
    article
  16. 316

    A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks by Shaik, Muzibur Rehman

    Published 2007
    “…OSPF calculates the shortest paths from each source to all destinations using the Dijkstra’s algorithm based on the weights assigned to the links. …”
    Get full text
    masterThesis
  17. 317

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The ENST00000671612.1 lncRNA transcript correlated with worse refractory free survival (RFS). Our data provides a step towards finding a novel diagnostic lncRNA-based panel for TNBC with potential therapeutic implications.…”
  18. 318
  19. 319

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Programs were designed to implement both the original and the enhanced algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  20. 320

    Towards a Unified Arabic Government Services Chatbot Based on Ontology by Areed, Sufyan

    Published 2020
    “…The feasibility of the proposed algorithm has been proven through executing multiple experimental tests for the same set of questions (414 questions) that were performed on the ontology earlier, then it has been compared with the ontology itself and the formal chatbot that has been designed by Smart Dubai Government (Rashid) chatbot. …”
    Get full text