Search alternatives:
method algorithm » mould algorithm (Expand Search)
first algorithm » firefly algorithm (Expand Search)
finding » findings (Expand Search)
Showing 221 - 240 results of 357 for search '(( elements method algorithm ) OR ((( data first algorithm ) OR ( based finding algorithm ))))', query time: 0.12s Refine Results
  1. 221

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  2. 222

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  3. 223

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  4. 224

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 225

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    masterThesis
  6. 226

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  7. 227

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 228
  9. 229

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers by Yousef, Hibba

    Published 2024
    “…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
    Get full text
  10. 230

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
  11. 231

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…Performance evaluation of the proposed methods and comparisons with existing methods are made by means of Monte-Carlo simulations, experimental data and analysis. The first scheme makes use of the complex cepstrum of the third-order cumulants (complex bicepstrum) of the ultrasonic signals. …”
    Get full text
    masterThesis
  12. 232

    Predicting COVID-19 cases using bidirectional LSTM on multivariate time series by Ahmed Ben Said (14158926)

    Published 2022
    “…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. …”
  13. 233

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  14. 234

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  15. 235

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 236
  17. 237

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 238
  19. 239

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 240

    EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach by Muhammad Adeel Asghar (6724982)

    Published 2019
    “…The BoDF model achieves 93.8% accuracy in the SEED data set and 77.4% accuracy in the DEAP data set, which is more accurate compared to other state-of-the-art methods of human emotion recognition.…”