Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
181
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
Published 2016“…The key novel characteristics of our system include seamless neighbor discovery and link quality estimation, intelligent clustering and channel allocation algorithms based on constrained minimum spanning trees, robustness against device mobility, and device centric operation with no changes to existing wireless systems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
182
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
183
Regression Testing of Database Applications
Published 2002“…Then, we propose an impact analysis technique that is based on dependencies that exist among the components of database applications. …”
Get full text
Get full text
Get full text
article -
184
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
185
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
Published 2024“…Apart from that, this article discusses some of the non-artificial intelligence-based automated systems. Furthermore, this article discusses the drawbacks of existing systems and proposes a novel framework for dysgraphia diagnosis and assistance evaluation.…”
-
186
Transformations for Variants of the Travelling Salesman Problem and Applications
Published 2017Get full text
doctoralThesis -
187
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
Published 2006“…SE is hybridized with force directed algorithm to speed-up the search. The proposed schemes are compared with previously presented SE based heuristics. …”
Get full text
article -
188
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The first solution is proposed based on integrating the existing surveillance camera systems with the recommended “Banking Payment Context- Account Based Ticketing System” to offer face recognition access entry to the passenger inside metro station. …”
Get full text
-
189
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
Published 2022“…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
-
190
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
191
Design of a vibration absorber for harmonically forced damped systems
Published 2013“…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
Get full text
Get full text
Get full text
Get full text
article -
192
A modified optimal design of a vibration absorber for ground motion isolation
Published 2014“…This approximate analytical solution is validated through comparison with the exact optimal parameters which were calculated numerically using two different numerical optimization methods. The first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
193
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
Get full text
-
194
-
195
Towards Multimedia Fragmentation
Published 2006“…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
196
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
Published 2022“…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
Get full text
Get full text
Get full text
masterThesis -
197
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
198
Predicting Android Malware Using Evolution Networks
Published 2025“…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …”
Get full text
Get full text
Get full text
masterThesis -
199
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
200
Data Redundancy Management in Connected Environments
Published 2020“…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject