Search alternatives:
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
Showing 461 - 480 results of 618 for search '(((( data making algorithm ) OR ( based method algorithm ))) OR ( element method algorithm ))', query time: 0.13s Refine Results
  1. 461

    An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks by Md Moktadir Rahman (16904751)

    Published 2022
    “…An improved hybrid particle swarm optimization algorithm (IHPSO) is proposed for the load controller to provide fast convergence and robust optimization results. …”
  2. 462

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
  3. 463

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…The proposed procedure exploits a more effective model selection criteria to generate <i>p</i>-values for statistical significance and is more efficient in terms of computational time and prediction accuracy than literature methods. Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  4. 464
  5. 465

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…Performance evaluation based on synthetic networks as well as real protein-protein interaction networks shows that the proposed algorithm can construct more accurate multiple network alignments compared to other leading methods.…”
  6. 466

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
    Get full text
    Get full text
    Get full text
    article
  7. 467

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
    Get full text
    Get full text
    Get full text
    article
  8. 468
  9. 469

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO by Majedeh Gheytanzadeh (17541927)

    Published 2022
    “…Considering the high cost and time-consuming experimental investigations, computational methods, particularly machine learning algorithms, can be the appropriate approach for efficiently screening the metal alloys as the electrocatalysts. …”
  10. 470
  11. 471
  12. 472

    Online dynamic ensemble deep random vector functional link neural network for forecasting by Ruobin Gao (16003195)

    Published 2023
    “…Then, an online learning algorithm is designed to learn the edRVFL. Finally, an online dynamic ensemble method, which can measure the change in the distribution, is proposed for aggregating all layers’ outputs. …”
  13. 473

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
  14. 474

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
  15. 475
  16. 476

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 477

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects by Mohamed Massaoudi (16888710)

    Published 2021
    “…Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …”
  18. 478

    Optimal supercharge scheduling of electric vehicles by Atallah, Ribal F.

    Published 2018
    “…The distributed game-theoretical approach recorded promising results especially when compared to the well-known shortest job first scheduling algorithm. Further, unlike the other approaches, which normally are centralized and suited for offline scheduling, the game-based method is suited for online scheduling since it played at anytime a batch of EVs requests charging services. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 479
  20. 480

    Information Warfare by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject