Search alternatives:
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
-
421
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
Published 2021“…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …”
Get full text
-
422
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…Among the task-specific models, the SVM trained on word data achieved the highest accuracy of 91.7%. …”
-
423
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
Published 2007“…Three years of data are used for model building and validation. …”
Get full text
article -
424
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
-
425
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…However, the improved performance is achieved at the expense of higher computational complexity and data requirements.…”
Get full text
masterThesis -
426
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
427
Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context
Published 0024“…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …”
Get full text
-
428
Communications in electronic textile systems
Published 2017“…This new type of processing system merges textile and electronic technologies. This paper studies the communication requirements between the computing and sensing elements of an e-textile. …”
Get full text
Get full text
Get full text
conferenceObject -
429
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…<div><p>Machine learning (ML)-based prediction is considered an important technique for improving decision making during the planning process. Modern ML models are used for prediction, prioritization, and decision making. …”
-
430
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …”
Get full text
Get full text
Get full text
Get full text
article -
431
Electric Vehicles Charging Station Load Forecasting Integration With Renewable Energy Using Novel Deep EfficientBiLSTMNet
Published 2025“…The model’s hyperparameters are optimized using an Enhanced Firefly Algorithm (EFA). …”
-
432
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …”
-
433
Recovery of business intelligence systems
Published 2018“…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
434
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…After that, the Natural Language Processing (NLP) tasks are used to process the services’ profiles and extract the ontological keywords. …”
Get full text
-
435
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …”
-
436
-
437
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…We trained and validated the models using the OGTT and demographic data of 1,492 healthy individuals collected during the San Antonio Heart Study. …”
-
438
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
Get full text
-
439
CEAP
Published 2016“…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
Get full text
Get full text
Get full text
Get full text
article -
440
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text