Showing 201 - 220 results of 988 for search '(((( based modeling algorithm ) OR ( data using algorithm ))) OR ( element data algorithm ))', query time: 0.14s Refine Results
  1. 201

    Process Targeting Of Multi-Characteristic Product Using Fuzzy Logic And Genetic Algorithm With An Interval Based Taguchi Cost Function by Duffuaa, S. O.

    Published 2020
    “…In this paper, a fuzzy based process targeting model is developed for a product with multi-characteristic. …”
    Get full text
    article
  2. 202

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm by Badreddine Kanouni (23073244)

    Published 2025
    “…The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
  3. 203

    A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading by Saoud A. Al-Janahi (18877213)

    Published 2020
    “…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…”
  4. 204
  5. 205

    Fuzzy genetic algorithm for floorplanning by Youssef, H.

    Published 2020
    “…In the proposed FGA, the fitness of individuals is evaluated based on fuzzy logic rules expressed on linguistic variables modeling the desired objective criteria of the problem domain. …”
    Get full text
    article
  6. 206

    Novel RFID-Based Pose Estimation Using Single Stationary Antenna by Saab, Samer S.

    Published 2016
    “…Our scheme is based on power map matching algorithm that is capable in estimating the location and orientation of objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 207
  8. 208
  9. 209
  10. 210
  11. 211

    Identification of physically based models of residential air-conditioners for direct load control management by El-Ferik, S.

    Published 2004
    “…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …”
    Get full text
    Get full text
    article
  12. 212
  13. 213

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 214

    Fragment based protein structure prediction. (c2013) by Terzian, Meghrig Ohanes

    Published 2016
    “…In addition, it demonstrates the advantage of using the CHARMM36 energy model. The method is based on a two-phase Scatter Search metaheuristic that minimizes the energy function. …”
    Get full text
    Get full text
    masterThesis
  15. 215
  16. 216
  17. 217

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  18. 218

    Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta by Vaisali Chandrasekar (16904526)

    Published 2023
    “…Several dataset analysis models are utilised to study the data diversity. Further, this study demonstrates the application of neural network-based models to effectively predict the permeability. …”
  19. 219

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  20. 220