Search alternatives:
using algorithms » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 181 - 200 results of 716 for search '(( data using algorithms ) OR ((( element mining algorithm ) OR ( element method algorithm ))))', query time: 0.13s Refine Results
  1. 181

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 182
  3. 183
  4. 184

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
    Get full text
    Get full text
  5. 185
  6. 186

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  7. 187
  8. 188

    A fast exact sequential algorithm for the partial digest problem by Mostafa M. Abbas (17058093)

    Published 2016
    “…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
  9. 189

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  10. 190

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
    Get full text
  11. 191

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…Among these, K-means is widely used for efficiently solving clustering problems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 192
  13. 193
  14. 194

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir (20748764)

    Published 2024
    “…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”
  15. 195

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
    Get full text
    Get full text
  16. 196

    Revolutionizing sustainable supply chain management: A review of metaheuristics by Abualigah, Laith

    Published 2023
    “…The paper also identifies the key factors that influence the success of using metaheuristics for SSCM, such as the choice of algorithm, problem complexity, and data quality. …”
    Get full text
  17. 197

    A method for optimizing test bus assignment and sizing for system-on-a-chip by Harmanani, Haidar M.

    Published 2017
    “…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 198

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 199

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
    Get full text
    Get full text
    article
  20. 200

    The buffered work-pool approach for search-tree based optimization algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject