Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 341 - 360 results of 681 for search '(((( work processing algorithm ) OR ( based modeling algorithm ))) OR ( element method algorithm ))', query time: 0.13s Refine Results
  1. 341

    Predicting Dropouts among a Homogeneous Population using a Data Mining Approach by BILQUISE, GHAZALA

    Published 2019
    “…In this research, we present a novel data mining approach to predict retention among a homogeneous group of students, with similar social and cultural background, at an academic institution based in the UAE. Our model successfully identifes dropouts at an early stage. …”
    Get full text
  2. 342

    A new bi-objective model of the urban public transportation hub network design under uncertainty by Firoozeh Kaveh (14150877)

    Published 2019
    “…For medium and large-sized problems, a meta-heuristic algorithm, namely multi-objective particle swarm optimization is applied and its performance is compared with results from the non-dominated sorting genetic algorithm. …”
  3. 343

    Stability improvement of the PSS-connected power system network with ensemble machine learning tool by M.S. Shahriar (19517536)

    Published 2022
    “…The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
  4. 344

    Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends by Abdellatif M. Sadeq (16931841)

    Published 2024
    “…The k-fold cross-validation technique is used for model training, and the developed neural network-based model is used to investigate the effects of operating parameters on the premixed turbulent flames. …”
  5. 345

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
    Get full text
    Get full text
    article
  6. 346
  7. 347
  8. 348
  9. 349

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. To solve nonlinear differential equations we use Runge-Kutta method of fourth order, and for the minimization part, we use two different methods, namely Nelder-Mead and Model Based Descent methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 350

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…We utilized parameter optimization techniques, namely Grid Search, Random Search, Bayes Search, Halvin Grid Search, and Halvin Random Search to fine-tune the hyperparameters of our classifier models. Experimental results demonstrated that the CatBoost algorithm achieved the highest level of accuracy (90.42%) in predicting microservice quality.…”
  11. 351

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  12. 352
  13. 353
  14. 354

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 355
  16. 356

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  17. 357
  18. 358

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. Genetic Algorithm would be used to optimize the performance of the system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 359
  20. 360

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. …”