Search alternatives:
processing algorithm » processing algorithms (Expand Search)
sample processing » image processing (Expand Search), melt processing (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
sample processing » image processing (Expand Search), melt processing (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
81
Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study
Published 2022“…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…”
Get full text
Get full text
Get full text
-
82
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
83
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…The proposed algorithm has been tested on three tank system pilot plant and Ain El Kebira Cement rotary kiln process. …”
-
84
Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility
Published 2019Get full text
Get full text
Get full text
Get full text
conferenceObject -
85
-
86
-
87
Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection
Published 2024“…<p>The increasing accessibility of extensive datasets has amplified the importance of extracting insights from high-dimensional data. However, the task of selecting relevant features in these high-dimensional spaces is made more difficult due to the curse of dimensionality. …”
-
88
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
89
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…In the initial phase, the proposed HNIDS utilizes hybrid EGA-PSO methods to enhance the minor data samples and thus produce a balanced data set to learn the sample attributes of small samples more accurately. …”
-
90
Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels
Published 2023“…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …”
-
91
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
Published 2022“…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
-
92
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…These further place the relevant dimension samples in one group. The method does not need to know the number of clusters before hand, as it dynamically determines it during the process. …”
-
93
-
94
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
-
95
-
96
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
-
97
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …”
-
98
-
99
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
-
100
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”