Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 101 - 120 results of 477 for search '(((( data mining algorithm ) OR ( data models algorithm ))) OR ( elements method algorithm ))', query time: 0.13s Refine Results
  1. 101
  2. 102
  3. 103

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
    Get full text
    Get full text
    masterThesis
  4. 104

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study by Mutasim Baba, Fuad

    Published 2022
    “…This methodology includes a variance-based sensitivity analysis to determine building parameters that significantly influence indoor air temperatures, the Multi-Objective Genetic Algorithm to calibrate different rooms simultaneously based on the significant param eters identified by the sensitivity analysis, and new evaluation criteria to achieve a high-accuracy calibrated model. …”
    Get full text
    Get full text
    Get full text
  5. 105

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…”
  6. 106

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology by Senyuk, Mihail

    Published 2023
    “…This work employs machine learning methods to develop and test a technique for dynamic stability analysis of the mathematical model of a power system. A distinctive feature of the proposed method is the absence of a priori parameters of the power system model. …”
    Get full text
    article
  7. 107
  8. 108

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  9. 109

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark by Ameema Zainab (16864263)

    Published 2021
    “…However, with the huge increase in data size, sophisticated models have to be created which require big data platforms. …”
  10. 110
  11. 111

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Multiple models have been proposed and different techniques and data structures were used. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 117
  18. 118
  19. 119
  20. 120

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”