Search alternatives:
processing algorithm » processing algorithms (Expand Search)
test processing » text processing (Expand Search), melt processing (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 382 for search '(((( test processing algorithm ) OR ( data processing algorithm ))) OR ( element study algorithm ))', query time: 0.14s Refine Results
  1. 141

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
    Get full text
  2. 142

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  3. 143

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 144

    Artificial intelligence-based methods for fusion of electronic health records and imaging data by Farida Mohsen (16994682)

    Published 2022
    “…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …”
  5. 145

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods by Abu Zitar, Raed

    Published 2023
    “…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
    Get full text
  6. 146

    A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition by Hanif Heidari (22467148)

    Published 2025
    “…Most improved RF versions modify attribute selection processes or combine them with other machine learning algorithms, increasing their complexity. …”
  7. 147

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
    Get full text
    article
  8. 148
  9. 149
  10. 150

    A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading by Saoud A. Al-Janahi (18877213)

    Published 2020
    “…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…”
  11. 151

    A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption by Azadeh, Ali

    Published 2019
    “…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 152
  13. 153

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  14. 154
  15. 155

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  16. 156

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
  17. 157

    Fuzzy Logic Adaptive Crow Search Algorithm for MPPT of a Partially Shaded Photovoltaic System by Mohamed Ali Zeddini (22047920)

    Published 2024
    “…Furthermore, a higher value of the fl is preferred to guide the optimization process in the direction of global search, whilst a lower fl value directs the algorithm in the direction of local search. …”
  18. 158
  19. 159
  20. 160

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article