Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
Showing 481 - 500 results of 688 for search '(( elements method algorithm ) OR ((( data testing algorithm ) OR ( based modeling algorithm ))))', query time: 0.12s Refine Results
  1. 481
  2. 482

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management by Islam Eljilany (14151588)

    Published 2023
    “…From the hospital's perspective, a cost-benefit analysis was conducted based on a 1-year decision-analytic follow-up model of the economic implications of using a pharmacogenetic algorithm vs standard of care in pre-operative warfarin management in the Hamad Medical Corporation, Qatar. …”
  3. 483

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…In this work, we propose a novel multiple network alignment algorithm based on a context-sensitive random walk model. …”
  4. 484
  5. 485
  6. 486

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  7. 487

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…In our work, we model web applications by associating features or web pages with states; state transition diagrams are based on events representing state transitions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 488
  9. 489

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 490

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 491

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  12. 492

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
    Get full text
    Get full text
    Get full text
    article
  13. 493
  14. 494
  15. 495

    Generic DFT approach for pattern sensitive faults in word-orientedmemories by Amin, A.A.

    Published 1996
    “…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
    Get full text
    Get full text
    article
  16. 496

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. …”
  17. 497
  18. 498

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
  19. 499

    Supervised term-category feature weighting for improved text classification by Attieh, Joseph

    Published 2022
    “…GradientDescentANN replaces the iterative additive process mentioned previously by computing the term-category matrix using a gradient descent ANN model. Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 500

    Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle by Korkmaz, Jessica

    Published 2025
    “…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …”
    Get full text
    Get full text
    Get full text
    masterThesis