Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 347 for search '(((( element method algorithm ) OR ( present data algorithm ))) OR ( data mining algorithm ))', query time: 0.11s Refine Results
  1. 161

    Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers by Hamidreza Besharatifard (16904823)

    Published 2022
    “…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
  2. 162

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
  3. 163

    Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System by Abu Zitar, Raed

    Published 2021
    “…A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …”
    Get full text
    Get full text
  4. 164

    From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors by Michael R. Giordano (9976173)

    Published 2021
    “…We also present a set of best practices to follow to obtain high-quality data from these low-cost sensors.…”
  5. 165

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
  6. 166

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.</p><h2>Other Information</h2> <p> Published in: Data Mining and Knowledge Discovery<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1007/s10618-020-00708-6" target="_blank">http://dx.doi.org/10.1007/s10618-020-00708-6</a></p>…”
  7. 167

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …”
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
  13. 173
  14. 174

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
  15. 175

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…However, high dimensional data present a significant challenge for machine learning techniques. …”
  16. 176

    Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review by Zainab Jan (17306614)

    Published 2023
    “…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. </p><h3>Conclusions </h3><p dir="ltr">This review presents an overview of studies based on AI models and algorithms used to predict and diagnose pancreatic cancer patients. …”
  17. 177
  18. 178
  19. 179

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
  20. 180

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis