Search alternatives:
model algorithm » mould algorithm (Expand Search)
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
-
181
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
Get full text
-
182
PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT
Published 2023“…The result shows that the accuracy performance of SVM algorithm is better than Naïve Bayes algorithm, but the speed is extremely slow compared to Naive Bayes model. …”
Get full text
Get full text
-
183
A PLC based power factor controller for a 3-phase induction motor
Published 2000“…This work focuses on the implementation of a laboratory model for a PLC based PFC to improve the power factor of a three-phase induction motor. …”
Get full text
Get full text
article -
184
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
-
185
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…During the evaluation, the different types of cyber-threat datasets are considered for testing and validation, and the results are compared with the recent state-of-the-art model approaches.…”
-
186
-
187
-
188
General Inspection Plan For Critical Multicharacteristic Components
Published 2020“…A mathematical model that depicts and represents the plan has been developed. …”
Get full text
article -
189
Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors
Published 2016“…However, accurate design models and clear simulation algorithms on the component-level are critical for the proper system-level engineering and evaluation of CPVT collectors. …”
Get full text
article -
190
Exploring the System Dynamics of Covid-19 in Emergency Medical Services
Published 2022“…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
191
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article -
192
EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach
Published 2019“…To reduce the feature dimensionality, spatial, and temporal based, bag of deep features (BoDF) model is proposed. A series of vocabularies consisting of 10 cluster centers of each class is calculated using the k-means cluster algorithm. …”
-
193
An Infrastructure-Assisted Workload Scheduling for Computational Resources Exploitation in the Fog-Enabled Vehicular Network
Published 2020“…A Dantzig–Wolfe decomposition algorithm is proposed which yields to a master program solvable by the Barrier algorithm and subproblems solve...…”
Get full text
Get full text
Get full text
Get full text
article -
194
Defense against adversarial attacks: robust and efficient compressed optimized neural networks
Published 2024“…<p dir="ltr">In the ongoing battle against adversarial attacks, adopting a suitable strategy to enhance model efficiency, bolster resistance to adversarial threats, and ensure practical deployment is crucial. …”
-
195
Parallel processing
Published 2005“…The parallel genetic algorithm is based on a model of natural evolution. …”
Get full text
Get full text
Get full text
conferenceObject -
196
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…Moreover, we discuss the different hyperparameter optimization techniques followed in the literature to improve the generalization performance of the RVFL model. …”
-
197
CEAP
Published 2016“…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past few years. …”
Get full text
Get full text
Get full text
Get full text
article -
198
Online Control and Optimization of Directional Drilling
Published 2020“…In this thesis, dynamic modeling of two different DSS were developed and optimized using different control and optimization techniques. …”
Get full text
masterThesis -
199
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
200
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”