Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 81 - 100 results of 892 for search '(((( developing based algorithm ) OR ( element atlas algorithm ))) OR ( data using algorithm ))', query time: 0.17s Refine Results
  1. 81

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…A total of eleven hundred experimental data points for nine FPs (two stratified and seven dispersed patterns) in horizontal wellbores are used to develop the MLs. …”
  2. 82

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  3. 83

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions by Liu, Wenpeng

    Published 2017
    “…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 84

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System by Abualigah, Laith

    Published 2023
    “…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …”
    Get full text
  5. 85
  6. 86

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 87

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
  8. 88

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  9. 89

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  10. 90
  11. 91

    Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units by Shanableh, Tamer

    Published 2019
    “…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
    Get full text
    article
  12. 92

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems by Khaled Dhibi (16891524)

    Published 2023
    “…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
  13. 93
  14. 94

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 95

    Auto-indexing Arabic texts based on association rule data mining. (c2015) by Rouba G. Nasrallah

    Published 2015
    “…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    masterThesis
  16. 96

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
    Get full text
  17. 97

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  18. 98

    A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition by Hanif Heidari (22467148)

    Published 2025
    “…A range of machine learning (ML) methods can be used to recognize facial expressions based on data from small to large datasets. …”
  19. 99

    NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY by JINESH, PADIKKAPPARAMBIL

    Published 2022
    “…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
    Get full text
  20. 100

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
    Get full text