Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
ml algorithms » _ algorithms (Expand Search), rd algorithm (Expand Search)
develop » developed (Expand Search)
Showing 121 - 140 results of 357 for search '(((( develop ml algorithms ) OR ( elements method algorithm ))) OR ( data processing algorithm ))', query time: 0.14s Refine Results
  1. 121
  2. 122

    A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates by Andrianarison, O.

    Published 2024
    “…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
    Get full text
    article
  3. 123

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
    Get full text
  4. 124

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  5. 125

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  6. 126

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 127
  8. 128

    A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption by Azadeh, Ali

    Published 2019
    “…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 129

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands by Peng, Wang

    Published 2020
    “…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
    Get full text
    Get full text
    Get full text
    article
  10. 130
  11. 131
  12. 132

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
  13. 133

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  14. 134
  15. 135
  16. 136

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  17. 137
  18. 138

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
  19. 139
  20. 140

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article