Showing 61 - 80 results of 217 for search '(((( implement modeling algorithm ) OR ( element data algorithm ))) OR ( data backing algorithm ))', query time: 0.12s Refine Results
  1. 61

    Modélisation et validation des modèles de véhicules hybrides by Mansour, Charbel

    Published 2009
    “…Une stratégie de contrôle prédictive pour le GMP THS-II est également élaborée par programmation dynamique (DP), afin d'optimiser la consommation sur une route spécifiée au lieu d'une optimisation instantanée telle la stratégie RB, et d'accélérer le temps de calcul de l'algorithme DP pour faciliter son implémentation au sein du véhicule pour des applications temps réel. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 62

    A hybrid of clustering and meta-heuristic algorithms to solve a p-mobile hub location–allocation problem with the depreciation cost of hub facilities by Mahdi Mokhtarzadeh (11593310)

    Published 2021
    “…A multi-objective mixed-integer non-linear programming (MINLP) model is developed. To solve the proposed model, four meta-heuristic algorithms, namely multi-objective particle swarm optimization (MOPSO), a non-dominated sorting genetic algorithm (NSGA-II), a hybrid of k-medoids as a famous clustering algorithm and NSGA-II (KNSGA-II), and a hybrid of K-medoids and MOPSO (KMOPSO) are implemented. …”
  3. 63
  4. 64

    Reinforcement R-learning model for time scheduling of on-demand fog placement by Farhat, Peter

    Published 2020
    “…An implementation of our proposed R-learning model is provided in the paper, followed by a series of experiments on a real dataset to prove its efficiency in utilizing fog resources and minimizing the cloud’s load. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 65
  6. 66

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  7. 67

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  8. 68
  9. 69
  10. 70
  11. 71

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
    Get full text
    article
  12. 72

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
    Get full text
    Get full text
    masterThesis
  13. 73

    A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI by Oishi Jyoti (21593819)

    Published 2025
    “…Three different publicly available datasets have been used based on the age group to create the best predicting model for each case. After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …”
  14. 74
  15. 75
  16. 76

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 77

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 78
  19. 79

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…We utilized parameter optimization techniques, namely Grid Search, Random Search, Bayes Search, Halvin Grid Search, and Halvin Random Search to fine-tune the hyperparameters of our classifier models. Experimental results demonstrated that the CatBoost algorithm achieved the highest level of accuracy (90.42%) in predicting microservice quality.…”
  20. 80