يعرض 161 - 180 نتائج من 245 نتيجة بحث عن '(( latest research algorithm ) OR ((( data code algorithm ) OR ( based finding algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 161
  2. 162

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities حسب Tekli, Joe

    منشور في 2007
    "…Various algorithms for comparing hierarchically structured data, e.g. …"
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 163

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper we employ two iterative heuristics for the optimization of VLSI Netlist Bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) [sadiq et al., 1999] respectively. …"
    احصل على النص الكامل
    article
  4. 164
  5. 165
  6. 166
  7. 167

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  8. 168
  9. 169

    General iterative heuristics for VLSI multiobjective partitioning حسب Sait, Sadiq M.

    منشور في 2003
    "…In this paper, we engineer two iterative heuristics for the optimization of VLSI netlist bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 170

    Comparative Study on Arabic Text Classification: Challenges and Opportunities حسب Abualigah, Laith

    منشور في 2022
    "…There have been great improvements in web technology over the past years which heavily loaded the Internet with various digital contents of different fields. This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …"
    احصل على النص الكامل
  11. 171

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices حسب Samir, Moataz

    منشور في 2019
    "…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 172

    Indexing Arabic texts using association rule data mining حسب Haraty, Ramzi A.

    منشور في 2019
    "…Research limitations/implications The stemming algorithm can be further enhanced. In the Arabic language, we have many grammatical rules. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 173

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 174

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  15. 175

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 176

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  17. 177

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  18. 178

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques حسب Arifa Zahir (20748764)

    منشور في 2024
    "…Given the ongoing challenges in agriculture, there is a belief that incorporating the latest technologies is crucial. The primary objective of this study is to explore how Deep Learning algorithms can be beneficial in categorizing agricultural records, particularly in monitoring and identifying variations in spring wheat germplasm. …"
  19. 179

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE حسب SHWEDEH, FATEN

    منشور في 2018
    "…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
    احصل على النص الكامل
  20. 180

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation حسب Saqr Khalil Saeed Thabet (19517560)

    منشور في 2022
    "…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …"