Showing 101 - 120 results of 312 for search '(((( elements data algorithm ) OR ( process modeling algorithm ))) OR ( neural coding algorithm ))', query time: 0.13s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…As a result of the models’ evaluation, a hybrid DL model is proposed that combines the best characteristics of the baseline models CNN, BLSTM and GRU for identifying cyberbullying. …”
    Get full text
  5. 105

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  6. 106

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  7. 107
  8. 108

    Internal Model Control Structure Using Adaptive Inverse Control Strategy by Shafiq, M.Riyaz

    Published 2003
    “…In this paper, we propose a new adaptive IMC scheme based on adaptive finite impulse response filters, which can be designed for both minimum and non-minimum phase systems in the same fashion. The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …”
    Get full text
    Get full text
    article
  9. 109

    Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application by Aram Rostami (22045274)

    Published 2024
    “…K<sub>med</sub> is calculated for D<sub>m.m</sub> and D<sub>w.w </sub>algorithm types in bone and lung media for both photon beams. …”
  10. 110
  11. 111

    Reinforcement R-learning model for time scheduling of on-demand fog placement by Farhat, Peter

    Published 2020
    “…Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 112

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …”
  13. 113

    Modeling and thermoeconomic analysis of new polygeneration system based on geothermal energy with sea water desalination and hydrogen production by Wulaer Shaersaikai (21436652)

    Published 2025
    “…The Grey Wolf Optimization (GWO) algorithm, which directs the system's optimization process, demonstrates a competitive trade-off between exergy efficiency, freshwater production, costs, NPV, and environmental impact. …”
  14. 114

    Integrating Quality And Maintenance Decisions In A Production- Inventory Model For Deteriorating Items by Alfares, HK

    Published 2020
    “…In typical production-inventory models of deteriorating items, deterioration of the production process has not been considered. …”
    Get full text
    article
  15. 115
  16. 116
  17. 117

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
  18. 118
  19. 119
  20. 120