Showing 521 - 540 results of 743 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( based could algorithm ))))', query time: 0.11s Refine Results
  1. 521

    Competitive learning/reflected residual vector quantization for coding angiogram images by Mourn, W.A.H.

    Published 2003
    “…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
    Get full text
    Get full text
    article
  2. 522

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  3. 523

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 524

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 525

    Information Warfare by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 526

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …”
  7. 527

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 528

    Video features with impact on user quality of experience by Abbas, Nadine

    Published 2021
    “…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 529

    Innovative mobile E-healthcare systems by Haraty, Ramzi A.

    Published 2016
    “…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 530

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  11. 531
  12. 532

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …”
  13. 533
  14. 534
  15. 535

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  16. 536

    Corona power loss computation in bundled bipolar conductors by Al-Hamouz, Z.M.

    Published 2000
    “…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
    Get full text
    Get full text
    article
  17. 537

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 538

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  19. 539

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  20. 540

    Three approaches to modelling heating and evaporation of monocomponent droplets by Dmitrii V. Antonov (21225041)

    Published 2024
    “…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”