Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
post processing » text processing (Expand Search)
two algorithms » _ algorithms (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
element » elements (Expand Search)
Showing 101 - 120 results of 469 for search '(((( data modeling algorithm ) OR ( post processing algorithm ))) OR ( element two algorithms ))', query time: 0.15s Refine Results
  1. 101

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  2. 102

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
    Get full text
  3. 103

    A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates by Andrianarison, O.

    Published 2024
    “…Within the framework of this Hamiltonian formalism, the in-plane of the piezoelectric multilayered plate is discretized into two-dimensional p-type high-order spectral finite elements while the resulting first-order one dimensional differential system is solved analytically by enforcing the interface continuity constraints. …”
    Get full text
    article
  4. 104

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …”
  5. 105
  6. 106
  7. 107

    Optimizing Document Classification: Unleashing the Power of Genetic Algorithms by Ghulam Mustafa (458105)

    Published 2023
    “…Additionally, our proposed model optimizes the features using a genetic algorithm. …”
  8. 108

    Fuzzy simulated evolution algorithm for topology design of campusnetworks by Youssef, H.

    Published 2000
    “…The two main phases of the algorithm, namely, evaluation and allocation, have been fuzzified. …”
    Get full text
    Get full text
    article
  9. 109

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 110

    Capturing outline of fonts using genetic algorithm and splines by Sarfraz, M.

    Published 2001
    “…In order to obtain a good spline model from large measurement data, we frequently have to deal with knots as variables, which becomes a continuous, non-linear and multivariate optimization problem with many local optima. …”
    Get full text
    Get full text
    article
  11. 111

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 112
  13. 113

    The effects of data balancing approaches: A case study by Paul Mooijman (4453189)

    Published 2023
    “…In this research, classification algorithms, combined with resampling strategies and dimensionality reduction methods, were investigated to find a prediction model to correctly identify the samples of treated animals. …”
  14. 114

    Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review by Mohamed Massaoudi (16888710)

    Published 2021
    “…With the massive smart meter integration, DL takes advantage of the large-scale and multi-source data representations to achieve a spectacular performance and high PV forecastability potential compared to classical models. …”
  15. 115

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…Results obtained by our SS algorithm are compared with other approaches. The 3D models predicted by our algorithm show improved root mean standard deviations with respect to the native structures.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 116
  17. 117

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  18. 118

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs by Tarsissi, Lama

    Published 2021
    “…In particular, they are unique, i.e., there do not exist two non isomorphic 3-uniform hypergraphs having the same degree sequence ds . …”
    Get full text
  19. 119

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  20. 120

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”