Showing 121 - 140 results of 324 for search '(((( complement 5a algorithm ) OR ( experimental data algorithm ))) OR ( level using algorithm ))', query time: 0.14s Refine Results
  1. 121

    Simultaneous stabilisation of power systems using geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …”
    Get full text
    Get full text
    article
  2. 122
  3. 123

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  4. 124
  5. 125

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…Though many item embedding approaches have been proposed for item cold-start recommendations in the past—and simple as they might appear—to the best of our knowledge, the approach based on soft-cluster embeddings has not been proposed in the research literature. Our experimental results on four benchmark datasets conclusively demonstrate that the proposed algorithm makes accurate recommendations in item cold-start settings compared to the state-of-the-art algorithms according to commonly used ranking metrics like Normalized Discounted Cumulative Gain (NDCG) and Mean Average Precision (MAP). …”
  6. 126
  7. 127

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 128

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
    Get full text
    article
  9. 129

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  10. 130
  11. 131
  12. 132

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output by Kaif Ahmed Lodi (16855518)

    Published 2020
    “…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
  13. 133
  14. 134
  15. 135

    FPGA-Based Network Traffic Classification Using Machine Learning by Elnawawy, Mohammed

    Published 2020
    “…Classification approaches based on machine learning techniques have shown promising results with high levels of accuracy. In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. …”
    Get full text
    article
  16. 136

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
  17. 137
  18. 138

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In our experimental analysis, we study the efficiency of our algorithms as well as the effectiveness of allowing vertex splitting. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 139

    A Graph Heuristic Approach for the Data Path Allocation Problem by Makhoul, Racha

    Published 2022
    “…To optimize this allocation problem, a variation of the Fiduccia-Mattheyses (FM) algorithm is presented. The algorithm starts with a schedule as input and partitions it into available hardware resources using a modifi ed version of the Fiduccia-Mattheyses algorithm to t the datapath allocation problem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 140

    Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review by Zainab Jan (17306614)

    Published 2023
    “…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. …”