Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
element » elements (Expand Search)
Showing 81 - 100 results of 804 for search '(((( data modeling algorithm ) OR ( based method algorithm ))) OR ( element method algorithm ))', query time: 0.14s Refine Results
  1. 81

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…For this purpose, software quality prediction models have been extensively used. However, building accurate prediction models is hard due to the lack of data in the domain of software engineering. …”
    Get full text
    Get full text
    Get full text
    article
  2. 82

    A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models by Azar, Danielle

    Published 2010
    “…In this paper, we present a genetic algorithm that adapts such models to new data. We give empirical evidence illustrating that our approach out-beats the machine learning algorithm C4.5 and random guess.…”
    Get full text
    Get full text
    Get full text
    article
  3. 83

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System by Abualigah, Laith

    Published 2023
    “…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …”
    Get full text
  4. 84
  5. 85
  6. 86

    Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm by Ali S. Alghamdi (17541711)

    Published 2023
    “…The proposed IARO-based scheduling framework’s performance is evaluated against that of traditional ARO, particle swarm optimization (PSO), and salp swarm algorithm (SSA). …”
  7. 87
  8. 88

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The first phase consists of an image processing-based method that extracts the Asymmetry, Border Irregularity, Color Variation and Diameter of a given mole. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 89

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 90
  11. 91

    The buffered work-pool approach for search-tree based optimization algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…This new trend has been motivated by hardness of approximation results that appeared in the last decade, and has taken a great boost by the emergence of parameterized complexity theory. Exact algorithms often follow the classical search-tree based recursive backtracking strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 92

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  13. 93
  14. 94

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  15. 95
  16. 96

    Using Machine Learning Algorithms to Forecast Solar Energy Power Output by Ali Jassim Lari (22597940)

    Published 2025
    “…The data forecasting horizon used was a 24-h window in steps of 30 min. …”
  17. 97

    Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms by Almahmood, Mothanna

    Published 2023
    “…Eighteen classification models were built using different classification algorithms such as Gaussian Naive Bais, Logistic Regression, k-nearest neighbors, Random Forest, and Decision Tree. …”
    Get full text
  18. 98
  19. 99

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
    Get full text
    article
  20. 100