يعرض 81 - 100 نتائج من 193 نتيجة بحث عن '(( data fitting algorithm ) OR ((( experiments based algorithm ) OR ( elements data algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 81

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …"
    احصل على النص الكامل
  2. 82
  3. 83

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark حسب Ameema Zainab (16864263)

    منشور في 2021
    "…The optimal value of clustering is used in this paper to cluster the data into groups to be able to reduce the computational time additionally. Multiple tree-based machine learning algorithms are tested with parallel computation to evaluate the performance with tunable parameters on a real-world dataset. …"
  4. 84

    Boosting the visibility of services in microservice architecture حسب Ahmet Vedat Tokmak (17773479)

    منشور في 2023
    "…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"
  5. 85
  6. 86
  7. 87

    Correlation Clustering via s-Club Cluster Edge Deletion حسب Makarem, Norma

    منشور في 2023
    "…We run these algorithms and cross-compare the three experiment results to the fastest Cluster Editing algorithm which runs in O(1.62k) time. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  8. 88

    Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018) حسب Tay, Bilal M.

    منشور في 2018
    "…The proposed scheme is capable of assessing the deployed access control polices and updating them systematically with new roles based on employees behaviors and system constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 89

    Mixed precision iterative refinement with adaptive precision sparse approximate inverse preconditioning حسب Noaman Khan (19810050)

    منشور في 2025
    "…In this work, we develop an adaptive precision sparse approximate inverse preconditioner and demonstrate its use within a five-precision GMRES-based iterative refinement method. We call this algorithm variant BSPAI-GMRES-IR. …"
  10. 90

    A clustering metaheuristic for large orienteering problems حسب Almiqdad Elzein (13141038)

    منشور في 2022
    "…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …"
  11. 91

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework حسب Tayyabah Hasan (18427887)

    منشور في 2022
    "…<div><p>Fog computing (FC) based sensor networks have emerged as a propitious archetype for next-generation wireless communication technology with caching, communication, and storage capacity services in the edge. …"
  12. 92

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 93
  14. 94

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
    احصل على النص الكامل
  15. 95

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks حسب Yassine Himeur (14158821)

    منشور في 2022
    "…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. …"
  16. 96

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل
  17. 97

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation حسب Zakaria Shams Siam (22048001)

    منشور في 2024
    "…Various CycleGAN architectures were experimented with and compared on this dataset. The best performing CycleGAN architecture successfully produced the reconstructed images with a high level of accuracy based on different quantitative and qualitative evaluation criteria. …"
  18. 98

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …"
    احصل على النص الكامل
  19. 99

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  20. 100