Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
c4d algorithm » rd algorithm (Expand Search)
levels using » cells using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
Showing 61 - 80 results of 220 for search '(((( complement c4d algorithm ) OR ( elements learning algorithm ))) OR ( levels using algorithm ))', query time: 0.14s Refine Results
  1. 61

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) by Wehbe, Gioia Wahib

    Published 2016
    “…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…”
    Get full text
    Get full text
    masterThesis
  2. 62

    Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm by Abraham Marquez Alcaide (18582451)

    Published 2020
    “…<p dir="ltr">Hand-in-hand with the smart-grid paradigm development, power converters used in high-power applications are facing important challenges related to efficiency and power quality. …”
  3. 63
  4. 64

    Integrated economic and environmental models for a multi stage cold supply chain under carbon tax regulation by Hariga, Moncer

    Published 2017
    “…The elevated level of public and organizations awareness concerning sustainability has necessitated the adoption of environmentally conscious practices in the management of supply chains. …”
    Get full text
    article
  5. 65

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…However, FRP-reinforced concrete (RC) structures exhibit less ductile response compared to steel RC structures. Recently, the use of basalt fiber reinforced concrete (BFRC) reinforced with BFRP bars was investigated to achieve a reasonable level of ductility in BFRC-BFRP one-way slabs. …”
  6. 66

    Simultaneous stabilisation of power systems using geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …”
    Get full text
    Get full text
    article
  7. 67
  8. 68

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  9. 69
  10. 70
  11. 71

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  12. 72

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 73
  14. 74

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
    Get full text
    article
  15. 75

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  16. 76
  17. 77
  18. 78

    FPGA-Based Network Traffic Classification Using Machine Learning by Elnawawy, Mohammed

    Published 2020
    “…Classification approaches based on machine learning techniques have shown promising results with high levels of accuracy. In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. …”
    Get full text
    article
  19. 79

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output by Kaif Ahmed Lodi (16855518)

    Published 2020
    “…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
  20. 80