Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data testing » data using (Expand Search)
Showing 321 - 340 results of 447 for search '(( elements method algorithm ) OR ((( data testing algorithm ) OR ( solved using algorithm ))))', query time: 0.11s Refine Results
  1. 321

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…We allocate newcomers to nodes with minimal computations and without changing the original optimized plan. The problem is solved using genetic algorithms that search within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 322

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…The contribution of this paper is four-fold: i. we generate an optimized block distribution scheme that minimizes the total system repair cost of all dependent and independent multiple node failure scenarios; ii. we address the practical scenario of having newly arriving blocks and allocate those blocks to existing nodes without any modification to the original on-node block distribution; iii. we consider new-comer nodes and generate an updated optimized block distribution; iv. we consider optimized storage and recovery of blocks with varying priority using variable fractional repetition codes. The four problems are modeled using incidence matrices and solved heuristically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 323
  4. 324

    Generic DFT approach for pattern sensitive faults in word-orientedmemories by Amin, A.A.

    Published 1996
    “…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
    Get full text
    Get full text
    article
  5. 325

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. …”
  6. 326

    On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints by Temadher A. Almaadeed (14151288)

    Published 2022
    “…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …”
  7. 327
  8. 328
  9. 329

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
  10. 330

    Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta by Vaisali Chandrasekar (16904526)

    Published 2023
    “…<p dir="ltr">Owing to limited drug testing possibilities in pregnant population, the development of computational algorithms is crucial to predict the fate of drugs in the placental barrier; it could serve as an alternative to animal testing. …”
  11. 331

    Geographical Area Network—Structural Health Monitoring Utility Computing Model by Hasan Tariq (18131842)

    Published 2019
    “…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …”
  12. 332

    Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology by Ajay Vikram Singh (204056)

    Published 2023
    “…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
  13. 333

    Topology and parameter estimation in power systems through inverter-based broadband stimulations by Margossian, Harag

    Published 2015
    “…It combines and correlates various measurements in order to obtain an accurate snapshot of the power network parameters. To test its capabilities, the performance of this algorithm is evaluated on a small-scale test system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 334
  15. 335

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  16. 336

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation by Saqr Khalil Saeed Thabet (19517560)

    Published 2022
    “…In the power-distortion problem, to obtain a target distortion, the algorithm exhaustively solves the closed form of the power resource under a predefined upper-bound bandwidth. …”
  17. 337

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …”
    Get full text
  18. 338

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 339

    Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …”
  20. 340