Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
161
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
162
-
163
-
164
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. …”
Get full text
-
165
-
166
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
167
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…The values are 18.44 % and 23.9 % for CV-RMSE, 11.6 % and 10.06 % for MAPE, and 7.5 % and 6.75 % for MdAPE, using ANN and GP, respectively. While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…”
-
168
-
169
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
Get full text
Get full text
Get full text
Get full text
article -
170
-
171
-
172
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
Published 2024Subjects: -
173
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
174
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article -
175
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
176
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
177
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
178
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
179
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
180
Software defect prediction. (c2019)
Published 2019Get full text
Get full text
Get full text
masterThesis