Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
-
41
-
42
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis -
43
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
44
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
Get full text
Get full text
-
45
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
Published 2019“…Findings Production, import, export, road construction and price are considered as the input data used in the present study. …”
Get full text
Get full text
Get full text
Get full text
article -
46
Software defect prediction. (c2019)
Published 2019Get full text
Get full text
Get full text
masterThesis -
47
-
48
-
49
-
50
-
51
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
52
-
53
-
54
-
55
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
56
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…Conformance checking compares a process model and recorded executions of a process, i.e., a log of traces. …”
Get full text
Get full text
Get full text
-
57
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
58
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
Get full text
Get full text
masterThesis -
59
-
60
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis