Showing 61 - 80 results of 249 for search '(( elements search algorithm ) OR ((( time processing algorithm ) OR ( neural coding algorithm ))))', query time: 0.17s Refine Results
  1. 61

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring by Muhammad E.H. Chowdhury (17151154)

    Published 2019
    “…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
  2. 62

    Burst Round Robin as a Proportional-Share Scheduling Algorithm by Helmy, Tarek

    Published 2020
    “…Experiments on the implemented simulator showed that quickly knocking away shortest processes achieves better turnaround time, waiting time, and response time. …”
    Get full text
    article
  3. 63

    A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation by Siddiqi, Umair F.

    Published 2020
    “…This paper proposes a parallel algorithm for inverse halftoning by parallelizing the LUT method of inverse halftoning. …”
    Get full text
    article
  4. 64

    Reinforcement R-learning model for time scheduling of on-demand fog placement by Farhat, Peter

    Published 2020
    “…We also demonstrate the ability of our model to improve over time by adapting the new demand of users. Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 65
  6. 66

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
    Get full text
    article
  7. 67
  8. 68
  9. 69

    Stochastic P-type/D-type iterative learning control algorithms by Saab, Samer S.

    Published 2003
    “…This paper presents stochastic algorithms that compute optimal and sub-optimal learning gains for a P-type iterative learning control algorithm (ILC) for a class of discrete-time-varying linear systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 70

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…The experiments also yield better results for G-means in terms of the coefficient of variance and the execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 71

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…Method This paper presents an adaptive approach that takes already built predictive models and adapts them (one at a time) to new data. We use an ant colony optimization algorithm in the adaptation process. …”
    Get full text
    Get full text
    Get full text
    article
  12. 72

    Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images by Abu Zitar, Raed

    Published 2023
    “…The solutions are evaluated using Otsu's fitness function throughout the optimization process. The picture histogram is used to display the algorithm's potential solutions. …”
    Get full text
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  20. 80

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam (22304047)

    Published 2025
    “…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”