Search alternatives:
method algorithm » mould algorithm (Expand Search)
settings » setting (Expand Search)
Showing 1 - 20 results of 1,230 for search '(( elements method algorithm ) OR ((( data settings algorithm ) OR ( based _ algorithm ))))*', query time: 0.14s Refine Results
  1. 1

    Data reductions and combinatorial bounds for improved approximation algorithms by Abu-Khzam, Faisal N.

    Published 2016
    “…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 2

    Allocating data to distributed-memory multiprocessors by genetic algorithms by Mansour, Nashat

    Published 2016
    “…We present three genetic algorithms (GAs) for allocating irregular data sets to multiprocessors. …”
    Get full text
    Get full text
    Get full text
    article
  3. 3
  4. 4

    Physical optimization algorithms for mapping data to distributed-memory multiprocessors by Mansour, Nashat

    Published 1992
    “…We also present a technique for efficient mapping of large data sets. The algorithms include a parallel genetic algorithm (PGA), a parallel neural network algorithm (PNN) and a parallel simulated annealing algorithm (PSA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 5
  6. 6
  7. 7

    Auto-indexing Arabic texts based on association rule data mining. (c2015) by Rouba G. Nasrallah

    Published 2015
    “…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    masterThesis
  8. 8

    Variable Selection in Data Analysis: A Synthetic Data Toolkit by Mitra, Rohan

    Published 2024
    “…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
    Get full text
    article
  9. 9

    Multi-marker-LD based genetic algorithm for tag SNP selection by Mansour, Nashat

    Published 2014
    “…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
    Get full text
    Get full text
    Get full text
    article
  10. 10
  11. 11
  12. 12

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    “…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …”
    Get full text
    Get full text
    Get full text
  13. 13

    Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques by Abdul Karim (417009)

    Published 2020
    “…This conclusion was achieved after preprocessing a number of data values from these data sets.</p><h2>Other Information</h2><p dir="ltr">Published in: Algorithms<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/a13080202" target="_blank">https://dx.doi.org/10.3390/a13080202</a></p>…”
  14. 14

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  15. 15

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  16. 16
  17. 17

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …”
  18. 18
  19. 19
  20. 20

    Automatic keyword extraction from a real estate classifieds data set by Devassy, Dibin

    Published 2011
    “…Keywords are considered to be a solution to this problem and are now widely used to search the information over the internet.In this project we analyze a real estate classifieds data set, with an objective to find keywords that represent this data set. …”
    Get full text