Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 181 - 200 results of 459 for search '(( data mining algorithm ) OR ((( develop based algorithm ) OR ( elements method algorithm ))))*', query time: 0.12s Refine Results
  1. 181

    Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers by Hamidreza Besharatifard (16904823)

    Published 2022
    “…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
  2. 182
  3. 183

    Hybrid Deep Learning-based Models for Crop Yield Prediction by Alexandros Oikonomidis (12050497)

    Published 2022
    “…In this study, we developed deep learning-based models to evaluate how the underlying algorithms perform with respect to different performance criteria. …”
  4. 184
  5. 185

    Towards a Unified Arabic Government Services Chatbot Based on Ontology by Areed, Sufyan

    Published 2020
    “…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
    Get full text
  6. 186

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.</p><h2>Other Information</h2> <p> Published in: Data Mining and Knowledge Discovery<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1007/s10618-020-00708-6" target="_blank">http://dx.doi.org/10.1007/s10618-020-00708-6</a></p>…”
  7. 187

    An Efficient Prediction System for Diabetes Disease Based on Deep Neural Network by Tawfik Beghriche (19563184)

    Published 2021
    “…Such algorithms are state‐of‐the‐art in computer vision, language processing, and image analysis, and when applied in healthcare for prediction and diagnosis purposes, these algorithms can produce highly accurate results. …”
  8. 188

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services by ALBARGHOTHI, ALI BAHA’EDDIN

    Published 2018
    “…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
    Get full text
  9. 189
  10. 190

    Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation by Asan G. A. Muthalif (16888818)

    Published 2021
    “…The analytical model is derived based on the Euler-Bernoulli model. The Optimal location of the collocated sensor-actuator, as well as PID controller gains, are determined using Ant Colony Optimization (ACO) technique, then compared with the Genetic Algorithm (GA) and enumerative method (EM). …”
  11. 191
  12. 192

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
    Get full text
    Get full text
    Get full text
    article
  13. 193

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  14. 194

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 195

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
  16. 196

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
  17. 197
  18. 198

    A combinatorial auction‐based approach for ridesharing in a student transportation system by Chefi Triki (14158860)

    Published 2023
    “…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …”
  19. 199

    Analysis of power system stability enhancement via excitation and FACTS-based stabilizers by Abido, M. A.

    Published 2004
    “…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …”
    Get full text
    article
  20. 200

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”