Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
Showing 641 - 660 results of 735 for search '(((( complement rd algorithm ) OR ( elements making algorithm ))) OR ( model using algorithm ))', query time: 0.12s Refine Results
  1. 641
  2. 642
  3. 643

    Software defect prediction. (c2019) by Moussa, Rebecca

    Published 2019
    “…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 644

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
  5. 645

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
  6. 646

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …”
  7. 647

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem by Abu Zitar, Raed

    Published 2021
    “…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …”
    Get full text
  8. 648

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic by Saeed Al-Maroof, Rana

    Published 2020
    “…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
    Get full text
    Get full text
  9. 649

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  10. 650

    A Multi-Channel Convolutional Neural Network approach to automate the citation screening process by Raymon van Dinter (10521952)

    Published 2021
    “…This study aims to automate the citation screening process using Deep Learning algorithms. With this, it is aimed to reduce the time and costs of the citation screening process and increase the precision and recall of the relevant primary studies. …”
  11. 651

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. …”
  12. 652

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…Our approach is based on the concept of tree edit distance, as an effective and efficient means for comparing tree structures, XML documents and DTDs being modeled as ordered labeled trees. It is of polynomial complexity, in comparison with existing exponential algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 653

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The problem is solved using genetic algorithms that search within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 654

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC by Abbas, Nadine

    Published 2022
    “…Compared to conventional and state-of-the-art system models, results show the effectiveness of the proposed schemes and provide useful insights into the tradeoffs between the number of completed tasks, energy consumption and monetary cost.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 655

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…The most common algorithm used in the included studies was support vector machine. …”
  16. 656

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…Given the limitations on accessing a real HVAC system for research purposes and the unavailability of public labeled datasets to investigate the cybersecurity of HVAC systems, this paper presents a dataset of a 12-zone HVAC system that was collected from a simulation model using the Transient System Simulation Tool (TRNSYS). …”
  17. 657

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…<p>Predictive performance of Machine Learning (ML) models rely on the quality of data used for training the models. …”
  18. 658

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 659

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  20. 660

    Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces by Uzair Sajjad (19646296)

    Published 2021
    “…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …”