Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data present » net present (Expand Search), past present (Expand Search)
element » elements (Expand Search)
Showing 181 - 200 results of 582 for search '(((( data present algorithm ) OR ( data modelling algorithm ))) OR ( element method algorithm ))*', query time: 0.15s Refine Results
  1. 181
  2. 182

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  3. 183

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  4. 184

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 185

    Big Data Energy Management, Analytics and Visualization for Residential Areas by Gupta, Ragini

    Published 2020
    “…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
    Get full text
    article
  6. 186

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
  7. 187

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
  8. 188

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  9. 189

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 190
  11. 191

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. This model can be used in a clinical setting as a decision support system or for public health awareness as an informal risk prediction system. …”
    Get full text
  12. 192

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 193

    Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry by Issa, Leila

    Published 2016
    “…We present a new and fast method that blends altimetric and drifter positions data in order to predict the surface velocity in the Eastern Levantine Mediterranean. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 194

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 195

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 196

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article
  17. 197

    Test Vector Decomposition Based Static Compaction Algorithms for Combinational Circuits by El-Maleh, Aiman H.

    Published 2003
    “…In addition, two new TVD based static compaction algorithms are presented. Experimental results for benchmark circuits demonstrate the effectiveness of the two new static compaction algorithms.…”
    Get full text
    article
  18. 198

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems by Khaled Dhibi (16891524)

    Published 2023
    “…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
  19. 199

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
    Get full text
  20. 200