Search alternatives:
processing algorithm » processing algorithms (Expand Search)
means algorithm » search algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 416 for search '(( element data algorithm ) OR ((( data processing algorithm ) OR ( based means algorithm ))))', query time: 0.14s Refine Results
  1. 141

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  2. 142

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash by Ilias K. Nikolaidis (9217172)

    Published 2022
    “…<p dir="ltr">New algorithms for vapor – liquid (VLE) and liquid - liquid (LLE) equilibrium calculations at constant temperature, pressure and feed phase composition (PT flash), with application to mixtures containing fully dissociating electrolytes are presented. …”
  3. 143
  4. 144

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  5. 145

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
  6. 146
  7. 147

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  8. 148
  9. 149

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms by Abdelouahed Hamdi (14158899)

    Published 2022
    “…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. …”
  10. 150

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
    Get full text
    article
  11. 151
  12. 152
  13. 153
  14. 154

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  15. 155
  16. 156

    A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I by Khasawneh, Mohammad

    Published 2013
    “…When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …”
    Get full text
    article
  17. 157

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…Educational Data Mining (EDM) is the process of discovering information and relationships from educational data for better understanding of students’ performance, and characteristics of their education providers. …”
    Get full text
  18. 158

    Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain by Jun Zhu (84054)

    Published 2017
    “…The VIIRS Environmental Data Record data (VIIRS_EDR) is produced operationally by NOAA, and is based on the MODIS atmospheric correction algorithm. …”
  19. 159

    Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare by MOHAMMAD, AHMAD HASAN

    Published 2023
    “…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …”
    Get full text
  20. 160