Showing 221 - 240 results of 895 for search '(( data using algorithm ) OR ((( developing based algorithm ) OR ( element data algorithm ))))', query time: 0.12s Refine Results
  1. 221

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices by Aya Hasan Alkhereibi (17151070)

    Published 2025
    “…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …”
  2. 222

    The effects of data balancing approaches: A case study by Paul Mooijman (4453189)

    Published 2023
    “…In this article, we present a case study approach for investigating the effects of data balancing approaches. The case study concerns the discrimination between growth hormone treated and non-treated animals using Liquid Chromatography-High Resolution Mass Spectrometry (LC-HRMS) data. …”
  3. 223

    A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS by Zerguine, Azzedine

    Published 2020
    “…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …”
    Get full text
    article
  4. 224

    An Algorithm For Computing The Distance Between Two Circular Disks by Almohamad, H.A.

    Published 2020
    “…For the case where the points are at the circumferences, the problem has no analytical solutions [IBM J. Res. Develop. 34 (5) (1990)]. Instead, we propose for the latter case an iterative algorithm based on computing the distance between a fixed point and a circle. …”
    Get full text
    article
  5. 225

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 226
  7. 227
  8. 228

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  9. 229
  10. 230
  11. 231

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …”
  12. 232

    Optimizing MPPT Control for Enhanced Efficiency in Sustainable Photovoltaic Microgrids: A DSO-Based Approach by Debabrata Mazumdar (18560506)

    Published 2024
    “…Lastly, an MPPT system interfaced with the DC microgrid based on DSO ensures a sustainable and reliable architecture to provide at load in low power generating situations.…”
  13. 233

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…The embedded controller is microprocessor based, which provides the designer with the advantage of using a highly-integrated processor and the ability to develop the software needed…”
    Get full text
    Get full text
    article
  14. 234

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
  15. 235

    A comparison of optimization heuristics for the data mapping problem by Mansour, Nashat

    Published 1997
    “…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  16. 236

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 237

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A pattern recognition model is applied to a revealed preference (RP) survey obtained from the Ministry of Transportation and Communication (MoTC) in Qatar for the travel diary for blue-collar workers. Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
  18. 238
  19. 239
  20. 240

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …”
    Get full text
    article