Search alternatives:
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
colony » colon (Expand Search)
Showing 1 - 20 results of 75 for search '(( elements rd algorithm ) OR ((( data colony algorithm ) OR ( based mapping algorithm ))))', query time: 0.12s Refine Results
  1. 1

    Bee Colony Algorithm for Proctors Assignment. by Mansour, Nashat

    Published 2015
    “…The search accomplished by three types of bees over a number of iterations aiming to find the source with the highest nectar value (fitness value of a candidate solution). We apply the Bee Colony algorithm to previously published data. Experimental results show good solutions that maximize the preferences of proctors while preserving the fairness of the workload given to proctors. …”
    Get full text
    Get full text
    Get full text
    article
  2. 2

    Stochastic evolution algorithm for technology mapping by Al-Mulhem, A.S.

    Published 1998
    “…SELF-Map is based on the Stochastic Evolution (SE) algorithm. …”
    Get full text
    Get full text
    article
  3. 3
  4. 4

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…We use an ant colony optimization algorithm in the adaptation process. …”
    Get full text
    Get full text
    Get full text
    article
  5. 5
  6. 6
  7. 7
  8. 8

    Physical optimization algorithms for mapping data to distributed-memory multiprocessors by Mansour, Nashat

    Published 1992
    “…The technique proposed for large problems is based on a pre-mapping graph contraction heuristic algorithm, which results in a smaller search space. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 9

    Map-based mobile positioning system by Saab, S. S.

    Published 2002
    “…In this paper, a mobile positioning system (MPS) is proposed based on a map-matching algorithm. Using the triangulation or a trilateration technique, the Cell of Origin, Time of Arrival, and Time Difference of Arrival, the mobile is first located within a specified area of about 500x500 squared meters in a GSM network and within a specified area of about 244x244 squared meters in an IS-95 network. …”
    Get full text
    Get full text
    Get full text
    article
  10. 10

    A comparison of data mapping algorithms for parallel iterative PDE solvers by Mansour, Nashat

    Published 1995
    “…Based on the comparison results, we recommend the use of the simplest and fastest (PQ) of the six algorithms considered for sequential compile-time mapping of 2-dimensional meshes.…”
    Get full text
    Get full text
    Get full text
    article
  11. 11
  12. 12

    Indoor Localization Based on Floor Plans and Power Maps by Khalifeh, Joe J.

    Published 2015
    “…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Multi-marker-LD based genetic algorithm for tag SNP selection by Mansour, Nashat

    Published 2014
    “…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
    Get full text
    Get full text
    Get full text
    article
  18. 18

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  19. 19

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
  20. 20

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes by Temadher Alassiry Al-Maadeed (14147847)

    Published 2022
    “…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”