Showing 181 - 200 results of 306 for search '(( differences model algorithm ) OR ( differences could algorithm ))', query time: 0.09s Refine Results
  1. 181

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai by Hamadeh, Moutaz Wajih

    Published 2015
    “…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
    Get full text
  2. 182

    PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT by Khalil Assayed, Suha

    Published 2023
    “…The result shows that the accuracy performance of SVM algorithm is better than Naïve Bayes algorithm, but the speed is extremely slow compared to Naive Bayes model. …”
    Get full text
    Get full text
  3. 183

    A PLC based power factor controller for a 3-phase induction motor by Al-Ali, A.R.

    Published 2000
    “…This work focuses on the implementation of a laboratory model for a PLC based PFC to improve the power factor of a three-phase induction motor. …”
    Get full text
    Get full text
    article
  4. 184

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  5. 185

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…During the evaluation, the different types of cyber-threat datasets are considered for testing and validation, and the results are compared with the recent state-of-the-art model approaches.…”
  6. 186
  7. 187
  8. 188

    General Inspection Plan For Critical Multicharacteristic Components by Duffuaa, S. O.

    Published 2020
    “…A mathematical model that depicts and represents the plan has been developed. …”
    Get full text
    article
  9. 189

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors by Sharaf, Omar Z.

    Published 2016
    “…However, accurate design models and clear simulation algorithms on the component-level are critical for the proper system-level engineering and evaluation of CPVT collectors. …”
    Get full text
    article
  10. 190

    Exploring the System Dynamics of Covid-19 in Emergency Medical Services by Ali, Muhammad

    Published 2022
    “…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 191

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
    Get full text
    Get full text
    Get full text
    article
  12. 192

    EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach by Muhammad Adeel Asghar (6724982)

    Published 2019
    “…To reduce the feature dimensionality, spatial, and temporal based, bag of deep features (BoDF) model is proposed. A series of vocabularies consisting of 10 cluster centers of each class is calculated using the k-means cluster algorithm. …”
  13. 193

    An Infrastructure-Assisted Workload Scheduling for Computational Resources Exploitation in the Fog-Enabled Vehicular Network by Sorkhoh, Ibrahim

    Published 2020
    “…A Dantzig–Wolfe decomposition algorithm is proposed which yields to a master program solvable by the Barrier algorithm and subproblems solve...…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 194

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks by Insaf Kraidia (19198012)

    Published 2024
    “…<p dir="ltr">In the ongoing battle against adversarial attacks, adopting a suitable strategy to enhance model efficiency, bolster resistance to adversarial threats, and ensure practical deployment is crucial. …”
  15. 195

    Parallel processing by Mansour, Nashat

    Published 2005
    “…The parallel genetic algorithm is based on a model of natural evolution. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 196

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…Moreover, we discuss the different hyperparameter optimization techniques followed in the literature to improve the generalization performance of the RVFL model. …”
  17. 197

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past few years. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 198

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…In this thesis, dynamic modeling of two different DSS were developed and optimized using different control and optimization techniques. …”
    Get full text
    masterThesis
  19. 199

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 200

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”