Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
Showing 581 - 600 results of 736 for search '(( elements network algorithm ) OR ((( data learning algorithm ) OR ( data using algorithm ))))*', query time: 0.13s Refine Results
  1. 581

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 582

    FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK by Al-Garni, Ahmed Z.

    Published 2007
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  3. 583

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 584

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  5. 585

    Information Warfare by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 586

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 587

    Video features with impact on user quality of experience by Abbas, Nadine

    Published 2021
    “…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 588

    Innovative mobile E-healthcare systems by Haraty, Ramzi A.

    Published 2016
    “…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 589

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
  10. 590
  11. 591

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation by Saqr Khalil Saeed Thabet (19517560)

    Published 2022
    “…At low power usage, the proposed method could achieve a PSNR gain of up to 1.5 dB over SoftCast and even a 1.789 dB gain over a distortion-resource algorithm, using less than 1.4% of the bandwidth.</p><h2>Other Information</h2><p dir="ltr">Published in: Applied Sciences<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/app12105047" target="_blank">https://dx.doi.org/10.3390/app12105047</a></p>…”
  12. 592
  13. 593

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  14. 594

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers by Yousef, Hibba

    Published 2024
    “…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
    Get full text
  15. 595

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 596

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Perhaps one of the more important algorithms is the AHY algorithm using semi-joins that is implemented by Apers, Hevner and Yao in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  17. 597

    Three approaches to modelling heating and evaporation of monocomponent droplets by Dmitrii V. Antonov (21225041)

    Published 2024
    “…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”
  18. 598

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …”
    Get full text
    Get full text
    Get full text
    article
  19. 599

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 600

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article