Search alternatives:
developing forest » developing 21st (Expand Search)
forest algorithm » firefly algorithm (Expand Search)
data algorithms » jaya algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 181 - 200 results of 694 for search '(((( developing forest algorithm ) OR ( element data algorithms ))) OR ( data using algorithm ))', query time: 0.15s Refine Results
  1. 181

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 182

    Social spider optimization algorithm: survey and new applications by Abualigah, Laith

    Published 2024
    “…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
    Get full text
  3. 183
  4. 184

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices by Aya Hasan Alkhereibi (17151070)

    Published 2025
    “…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …”
  5. 185

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
  6. 186

    A comparison of optimization heuristics for the data mapping problem by Mansour, Nashat

    Published 1997
    “…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  7. 187

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 188

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…This study presents an approach to design and deploy a data mining project that can be used as a basis for developing systems to enable the selection of student majors.…”
    Get full text
  9. 189
  10. 190
  11. 191

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …”
    Get full text
    article
  12. 192

    A fast exact sequential algorithm for the partial digest problem by Mostafa M. Abbas (17058093)

    Published 2016
    “…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
  13. 193

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  14. 194
  15. 195

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…Among these, K-means is widely used for efficiently solving clustering problems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 196

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
    Get full text
    Get full text
  17. 197
  18. 198

    Deep Learning-Based Short-Term Load Forecasting Approach in Smart Grid With Clustering and Consumption Pattern Recognition by Dabeeruddin Syed (16864260)

    Published 2021
    “…Whilst different models are proposed for STLF, they are based on small historical datasets and are not scalable to process large amounts of big data as energy consumption data grow exponentially in large electric distribution networks. …”
  19. 199
  20. 200

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir (20748764)

    Published 2024
    “…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”