Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
process algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 1 - 20 results of 818 for search '(((( data modelling algorithm ) OR ( _ process algorithm ))) OR ( elements data algorithm ))*', query time: 0.14s Refine Results
  1. 1

    Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing by Al Sadawi, Alia

    Published 2016
    “…A Master of Science thesis in Engineering Systems Management by Alia Al Sadawi entitled, "Efficient Dynamic Cost Scheduling Algorithm for Data Batch Process," submitted in May 2016. …”
    Get full text
    doctoralThesis
  2. 2
  3. 3

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain by Al Sadawi, Alia

    Published 2021
    “…An iterative dynamic scheduling algorithm (DCSDBP) was developed to address the data batching process. …”
    Get full text
    article
  4. 4

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…However, high dimensional data often contains irrelevant features, outliers, and noise, which can negatively impact model performance and consume computational resources. …”
  5. 5
  6. 6
  7. 7

    Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm by Odat, Alhaj-Saleh A.

    Published 2024
    “…Additionally, these data can be readily applied to compare algorithmic results referenced by (Babu, T.S. et al., 2015; PrasanthRam, J. et al., 2017) [2,3], and contribute to the development of new processes for practical applications.…”
    Get full text
    Get full text
    Get full text
    article
  8. 8
  9. 9

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
    Get full text
    Get full text
    Get full text
  10. 10
  11. 11
  12. 12

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
  13. 13

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…For this purpose, software quality prediction models have been extensively used. However, building accurate prediction models is hard due to the lack of data in the domain of software engineering. …”
    Get full text
    Get full text
    Get full text
    article
  14. 14

    Correlation Clustering via s-Club Cluster Edge Deletion by Makarem, Norma

    Published 2023
    Subjects: “…Cluster analysis -- Data processing…”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 15
  16. 16

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks by Najam Us Sahar Riyaz (22927843)

    Published 2025
    “…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
  17. 17
  18. 18

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…In this paper, an optimization algorithm is proposed to reduce net data traffic, which works at Internet layer in the TCP/IP reference model. …”
    Get full text
    article
  19. 19

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We have suggested the SFL-HMM together with HMS-ACO process as a method used for detection of the cyber attacks. …”
    Get full text
    Get full text
  20. 20