Showing 201 - 220 results of 333 for search '(((( complement c5 algorithm ) OR ( experiments based algorithm ))) OR ( levels using algorithm ))', query time: 0.14s Refine Results
  1. 201

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  2. 202
  3. 203

    Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d... by Tarik Elhadd (5480393)

    Published 2020
    “…The optimal XGBoost model prioritized age, gender, BMI and HbA1c followed by glucose levels and physical activity. Interestingly, the blood glucose level prediction by our model was influenced by use of SGLT2i.…”
  4. 204

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…An Evolutionary Memetic Algorithm is elaborated to solve our vehicular container placement problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 205

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  6. 206

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes by Muhammad Mohsin Khan (22150360)

    Published 2025
    “…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …”
  7. 207

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  8. 208
  9. 209

    A TABU SEARCH APPROACH TO THE CLUSTERING PROBLEM by AlSultan, K.S.

    Published 2020
    “…In this paper, we develop a new algorithm for solving this problem based on a tabu search technique. …”
    Get full text
    article
  10. 210

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes by Wadi, Ali

    Published 2019
    “…Then, the algorithm was used to process the five experimental datasets. …”
    Get full text
    article
  11. 211

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
  12. 212
  13. 213

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 214

    Mechanical perturbation control of cardiac alternans by Hazim, Azzam

    Published 2018
    “…We analyze the effects of mechanical perturbation on the dynamics of amap model that couples themembrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. …”
    Get full text
    article
  15. 215

    BioNetApp: An interactive visual data analysis platform for molecular expressions by Ali M. Roumani (18615124)

    Published 2019
    “…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
  16. 216
  17. 217

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  18. 218

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
    Get full text
  19. 219

    Exploring the System Dynamics of Covid-19 in Emergency Medical Services by Ali, Muhammad

    Published 2022
    “…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 220

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text