Showing 121 - 140 results of 174 for search '(((( experiments based algorithm ) OR ( complement i algorithm ))) OR ( neural coding algorithm ))', query time: 0.12s Refine Results
  1. 121
  2. 122
  3. 123

    BioNetApp: An interactive visual data analysis platform for molecular expressions by Ali M. Roumani (18615124)

    Published 2019
    “…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
  4. 124

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  5. 125

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
    Get full text
  6. 126
  7. 127

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
  8. 128

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  9. 129

    Fast Methods Fbr Split Codebooks by Elshafei-Ahmed, M

    Published 2020
    “…The paper presents algorithms for the generation of the SFC mapping utilizing the self-replication feature of the curves, and a number of simulation experiments to demonstrate the effectiveness of the method. …”
    Get full text
    article
  10. 130

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  11. 131

    Iterative heuristics for multiobjective VLSI standard cellplacement by Sait, Sadiq M.

    Published 2001
    “…We employ two iterative heuristics for the optimization of VLSI standard cell placement. These heuristics are based on genetic algorithms (GA) and tabu search (TS) respectively. …”
    Get full text
    Get full text
    article
  12. 132

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... by Mohamed Elsayed Saad Aboudonya (18466385)

    Published 2024
    “…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
  13. 133

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Derivation of the basic differential equations is based on the Navier-Stokes equations of continuity and fluid motion, in addition to the convection-dispersion equation. …”
    Get full text
    Get full text
    masterThesis
  14. 134

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  15. 135

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
    Get full text
    Get full text
    Get full text
    article
  16. 136

    Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System by Alaa Altawallbeh (22565837)

    Published 2025
    “…Through systematic eigenvalue analysis and parameter sensitivity studies, complemented by time-domain verification in MATLAB/SIMULINK, we demonstrate the decisive influence of VSG control parameters on low-frequency oscillation (LFO) damping characteristics, transient frequency stability metrics, including the rate of change of frequency (ROCOF), maximum frequency deviation (<i>fnadir</i>), overshoot, and settling time. …”
  17. 137

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  18. 138

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  19. 139

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
  20. 140

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring by Muhammad E.H. Chowdhury (17151154)

    Published 2019
    “…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”