Showing 121 - 140 results of 409 for search '(((( data processing algorithm ) OR ( based location algorithm ))) OR ( element method algorithm ))', query time: 0.12s Refine Results
  1. 121

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  2. 122

    A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS by Youssef, H.

    Published 2020
    “…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
    Get full text
    article
  3. 123

    Big Data Energy Management, Analytics and Visualization for Residential Areas by Gupta, Ragini

    Published 2020
    “…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
    Get full text
    article
  4. 124

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…Textual data contains much useless information that must be pre-processed. …”
  5. 125
  6. 126

    Deep Learning-Based Short-Term Load Forecasting Approach in Smart Grid With Clustering and Consumption Pattern Recognition by Dabeeruddin Syed (16864260)

    Published 2021
    “…Whilst different models are proposed for STLF, they are based on small historical datasets and are not scalable to process large amounts of big data as energy consumption data grow exponentially in large electric distribution networks. …”
  7. 127
  8. 128
  9. 129
  10. 130

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 131

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 132

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…We use an ant colony optimization algorithm in the adaptation process. The approach is validated on stability of classes in object-oriented software systems and can easily be used for any other software quality characteristic. …”
    Get full text
    Get full text
    Get full text
    article
  13. 133

    Evolutionary algorithms for state justification in sequential automatic test pattern generation by El-Maleh, Aiman H.

    Published 2005
    “…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
    Get full text
    article
  14. 134
  15. 135

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…An integrated web application is developed to mock up the end-to-end process in ecommerce. Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
    Get full text
  16. 136
  17. 137

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
    Get full text
  18. 138

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  19. 139

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  20. 140

    Artificial intelligence-based methods for fusion of electronic health records and imaging data by Farida Mohsen (16994682)

    Published 2022
    “…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …”