Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element based » event based (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element based » event based (Expand Search)
-
81
-
82
Design of adaptive arrays based on element position perturbations
Published 1993Get full text
Get full text
article -
83
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
Get full text
-
84
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
Get full text
Get full text
-
85
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
86
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
Published 2002“…Our model uses a large number of simple processing elements or neurons, based on the McCulloch-Pitts binary neuron. …”
Get full text
Get full text
article -
87
Predictive modelling in times of public health emergencies: patients’ non-transport decisions during the COVID-19 pandemic
Published 2025“…</p><h3>Methods</h3><p dir="ltr">Using Python® programming language, this study employed various supervised machine-learning algorithms, including parametric probabilistic models, such as logistic regression, and non-parametric models, including decision trees, random forest (RF), extra trees, AdaBoost, and k-nearest neighbours (KNN), using a dataset of non-transported patients (refused transport and did not receive treatment versus those who refused transport and received treatment) between 2018 and 2022. …”
-
88
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…Hundreds of such labeled graphs were used to train the model to predict the location of centroids. …”
Get full text
Get full text
Get full text
masterThesis -
89
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
-
90
-
91
Correlation Clustering with Overlaps
Published 2020Get full text
Get full text
Get full text
masterThesis -
92
Parallel physical optimization algorithms for allocating data to multicomputer nodes
Published 1994“…Three parallel physical optimization algorithms for allocating irregular data to multicomputer nodes are presented. …”
Get full text
Get full text
Get full text
article -
93
-
94
Information reconciliation through agent controlled graph model. (c2018)
Published 2018“…Multiple models have been proposed and different techniques and data structures were used. …”
Get full text
Get full text
Get full text
masterThesis -
95
Detecting Game Bugs Using Genetic Algorithms And Reachability Analysis Of Colored Petri Nets Models
Published 2020Get full text
masterThesis -
96
-
97
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
98
-
99
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
-
100
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”