يعرض 461 - 480 نتائج من 723 نتيجة بحث عن '(( elements method algorithm ) OR ((( data using algorithm ) OR ( based rd algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 461

    Evacuation of a highly congested urban city حسب El Khoury, John

    منشور في 2017
    "…A case study using real population and transportation network data was tested using the proposed methodology. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 462

    Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant حسب ALMutawa, J.

    منشور في 2007
    "…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 463
  4. 464

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) حسب Stamboulian, Mouses Hrag

    منشور في 2015
    "…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 465

    Optimizing ADWIN for Steady Streams حسب Moharram, Hassan

    منشور في 2022
    "…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  6. 466

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization حسب Majdi Mansouri (16869885)

    منشور في 2022
    "…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
  7. 467

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …"
    احصل على النص الكامل
  8. 468

    High-order parametrization of the hypergeometric-Meijer approximants حسب Abouzeid M. Shalaby (16329062)

    منشور في 2023
    "…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …"
  9. 469
  10. 470
  11. 471

    A forward-backward Kalman for the estimation of time-variant channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 2005
    "…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 472

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  13. 473

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
    احصل على النص الكامل
  14. 474

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  15. 475

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 476

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  17. 477

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 0000
    "…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 478

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 479
  20. 480

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"