Showing 181 - 200 results of 804 for search '(((( data models algorithm ) OR ( based methods algorithm ))) OR ( elements method algorithm ))*', query time: 0.13s Refine Results
  1. 181

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”
  2. 182
  3. 183

    A new method of analysis for slender columns by Zdenek, P.

    Published 1991
    “…The method consists of a simple incremental-loading algorithm that traces the load-deflection curve at constant eccentricity of the axial load. …”
    Get full text
    Get full text
    article
  4. 184
  5. 185

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Mara'Beh (17337892)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  6. 186

    An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications by Abu Zitar, Raed

    Published 2021
    “…In this review paper, JAYA algorithm, which is a recent population-based algorithm is intensively overviewed. …”
    Get full text
  7. 187

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  8. 188
  9. 189

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
    Get full text
  10. 190

    Parallel Algorithm for Hardware Implementation of Inverse Halftoning by Siddiqi, Umair F.

    Published 2005
    “…The algorithm is based on Lookup Tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
    Get full text
    article
  11. 191

    Parallel algorithm for hardware implementation of inverse halftoning by Siddiqi, U.F.

    Published 2005
    “…The algorithm is based on lookup tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
    Get full text
    Get full text
    article
  12. 192

    Trial-based dominance for comparing both the speed and accuracy of stochastic optimizers with standard non-parametric tests by Kenneth V. Price (17877002)

    Published 2023
    “…This paper describes how trial-based dominance can totally order this two-variable dataset of outcomes so that traditional non-parametric methods can determine the better of two algorithms when one is faster, but less accurate than the other, i.e. when neither algorithm dominates. …”
  13. 193
  14. 194

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. This model can be used in a clinical setting as a decision support system or for public health awareness as an informal risk prediction system. …”
    Get full text
  15. 195

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
  16. 196

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…The CPR method is one of the most established techniques for reservoir simulations, but most research focused on solutions for Two-Point Flux Approximation (TPFA)-based discretizations that do not readily extend to our problem formulation. …”
  17. 197

    Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Alg... by Ali S. Alghamdi (12722891)

    Published 2023
    “…In this paper, the scheduling and management framework of an energy hub (EH) is presented with the aim of energy profit maximization in partnership with electricity, natural gas, and district heating networks (EGHNs) considering the coordinated multi-energy management based on the day-ahead market. The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …”
  18. 198

    Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation by Khaliqur Rahman (10214098)

    Published 2019
    “…<p dir="ltr">In this paper, space vector pulse width modulation (SVPWM)-based algorithms for a five-phase open-end load fed from dual matrix converter (DMC) have been proposed. …”
  19. 199
  20. 200

    Stability improvement of the PSS-connected power system network with ensemble machine learning tool by M.S. Shahriar (19517536)

    Published 2022
    “…The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”