Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element based » event based (Expand Search)
Showing 81 - 100 results of 791 for search '(((( data modelling algorithm ) OR ( model using algorithm ))) OR ( element based algorithm ))', query time: 0.12s Refine Results
  1. 81
  2. 82
  3. 83

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
  4. 84

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
    Get full text
  5. 85
  6. 86

    A Parallel Neural Networks Algorithm for the Clique Partitioning Problem by Harmanani, Haidar M.

    Published 2002
    “…Our model uses a large number of simple processing elements or neurons, based on the McCulloch-Pitts binary neuron. …”
    Get full text
    Get full text
    article
  7. 87

    Predictive modelling in times of public health emergencies: patients’ non-transport decisions during the COVID-19 pandemic by Hassan Farhat (9000509)

    Published 2025
    “…</p><h3>Methods</h3><p dir="ltr">Using Python® programming language, this study employed various supervised machine-learning algorithms, including parametric probabilistic models, such as logistic regression, and non-parametric models, including decision trees, random forest (RF), extra trees, AdaBoost, and k-nearest neighbours (KNN), using a dataset of non-transported patients (refused transport and did not receive treatment versus those who refused transport and received treatment) between 2018 and 2022. …”
  8. 88

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…Hundreds of such labeled graphs were used to train the model to predict the location of centroids. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 89

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  10. 90
  11. 91
  12. 92

    Parallel physical optimization algorithms for allocating data to multicomputer nodes by Mansour, Nashat

    Published 1994
    “…Three parallel physical optimization algorithms for allocating irregular data to multicomputer nodes are presented. …”
    Get full text
    Get full text
    Get full text
    article
  13. 93
  14. 94

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Multiple models have been proposed and different techniques and data structures were used. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 95
  16. 96
  17. 97

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  18. 98
  19. 99

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  20. 100

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”