Search alternatives:
data selection » data injection (Expand Search)
Showing 161 - 180 results of 449 for search '(( data selection algorithm ) OR ( data ((optimization algorithm) OR (detection algorithm)) ))', query time: 0.13s Refine Results
  1. 161

    Scatter Search algorithm for Protein Structure Prediction by Mansour, Nashat

    Published 2016
    “…The results show that our algorithm is able to produce 3D structures with good sub-optimal energy values. …”
    Get full text
    Get full text
    Get full text
    article
  2. 162
  3. 163

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…This study was conducted with the aim of finding the benefits of data mining on small businesses and specifically on the real estate sector in Dubai, and the criteria to be used when evaluating and selecting the best tools to consider for such businesses. …”
    Get full text
  4. 164
  5. 165

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
    Get full text
  6. 166

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  7. 167

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting by Mohamed Massaoudi (16888710)

    Published 2021
    “…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
  8. 168
  9. 169

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…Web site schema detection and data extraction from the Deep Web have been studied a lot. …”
    Get full text
    Get full text
  10. 170

    Graph contraction for physical optimization methods by Mansour, Nashat

    Published 1993
    “…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 171

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 172

    Plant disease detection using drones in precision agriculture by Ruben Chin (17725986)

    Published 2023
    “…To address this problem, a systematic literature review (SLR) on the use of drones for plant disease detection was undertaken and 38 primary studies were selected to answer research questions related to disease types, drone categories, stakeholders, machine learning tasks, data, techniques to support decision-making, agricultural product types and challenges. …”
  13. 173

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 174

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…</p><h3>Objective</h3><p dir="ltr">The aim of this study was to identify and group the different types of AI-based technologies used to detect and classify skin cancer. The study also examined the reliability of the selected papers by studying the correlation between the data set size and the number of diagnostic classes with the performance metrics used to evaluate the models.…”
  15. 175

    Using machine learning for disease detection. (c2013) by Jreij, Georges Antoun

    Published 2016
    “…Classification has three main components: the classification algorithm, the pre-classified data (training data) and the un-classified data (testing data). …”
    Get full text
    Get full text
    masterThesis
  16. 176

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…Gravitational Search Algorithm (GSA) is developed to search for optimal settings of the proposed controller. …”
    Get full text
    masterThesis
  17. 177

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…The proposed scheme for handover prediction outperforms traditional methods i.e. received signal strength method and traveling distance method by reducing the number of unnecessary handovers by 60% and 50% respectively. Similarly, in AP selection, the proposed scheme outperforms the strongest signal first and least loaded first algorithms by achieving higher throughput gains up to 9.2% and 8% respectively.…”
  18. 178

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  19. 179
  20. 180

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
    Get full text
    Get full text