Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
Showing 301 - 320 results of 754 for search '(( elements study algorithm ) OR ((( based modeling algorithm ) OR ( data processing algorithm ))))', query time: 0.13s Refine Results
  1. 301

    DSDM: A Distributed Service Discovery Model for Manets by Artail, Hassan

    Published 2008
    “…The designed system is based on storing service descriptions in selected nodes that are searched in accordance to a proposed Minimum Distance Packet Forwarding (MDPF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 302
  3. 303

    A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand by Khawar Naeem (17984062)

    Published 2023
    “…The models included agent-based modeling (ABM), Bayesian networking (BN), analytical hierarchy approach (AHP), and simulation optimization multi-objective optimization (MOO). …”
  4. 304

    Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d... by Tarik Elhadd (5480393)

    Published 2020
    “…<h3>Objective</h3><p dir="ltr">To develop a machine-based algorithm from clinical and demographic data, physical activity and glucose variability to predict hyperglycaemic and hypoglycaemic excursions in patients with type 2 diabetes on multiple glucose lowering therapies who fast during Ramadan.…”
  5. 305

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  6. 306
  7. 307
  8. 308

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …”
  9. 309
  10. 310

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text
  11. 311

    Fragment-based computational protein structure prediction by Mansour, Nashat

    Published 2014
    “…The method is based on a two-phase Scatter Search algorithm that minimizes the energy function. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 312

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. This paper proposes a programming-language-independent technique for regression test selection for object-oriented software based on Unified Modeling Language (UML 2.0) design diagrams. …”
    Get full text
    Get full text
    Get full text
    article
  13. 313

    Decomposition method for solving a nonlinear business cycle model by Dibeh, Ghassan

    Published 2003
    “…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 314

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Indeed, the aforesaid method is based on mathematical optimization. This paper constructs a second-order conic optimization problem unifying several DEA models. …”
    Get full text
    Get full text
  15. 315

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The proposed simulated model can find the most relevant sensor(s) capable of generating the best quality tracks based on weighted distance criteria (Euclidean and Mahalanobis ). …”
    Get full text
  16. 316
  17. 317

    Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection by Atiq ur Rehman (3044409)

    Published 2024
    “…Although Evolutionary Algorithms (EAs) have shown promise in the literature for feature selection, creating EAs for high dimensions is still challenging. …”
  18. 318
  19. 319

    Modélisation et validation des modèles de véhicules hybrides by Mansour, Charbel

    Published 2009
    “…Ensuite, une analyse approfondie du GMP série/parallèle est réalisée: étude de cas de la Prius. Un modèle et une validation expérimentale du GMP Toyota Hybrid System (THS-II) sont élaborés. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 320

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …”