Showing 161 - 180 results of 370 for search '(( element method algorithm ) OR ((( data code algorithm ) OR ( data processing algorithms ))))', query time: 0.11s Refine Results
  1. 161

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text
  2. 162

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  3. 163
  4. 164

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy by Haitao Xu (435549)

    Published 2023
    “…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. The ANN reliability is directly related to the success of the training process. …”
  5. 165

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …”
  6. 166

    Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection by Atiq ur Rehman (3044409)

    Published 2024
    “…<p>The increasing accessibility of extensive datasets has amplified the importance of extracting insights from high-dimensional data. However, the task of selecting relevant features in these high-dimensional spaces is made more difficult due to the curse of dimensionality. …”
  7. 167

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…The reliability of the annotations is verified through a two-step validation process involving a Senior Attending Physician and a Radiologic Technologist. …”
  8. 168

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  9. 169

    Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers by Hamidreza Besharatifard (16904823)

    Published 2022
    “…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
  10. 170

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands by Peng, Wang

    Published 2020
    “…In order to model the uncertainty effects, a data-driven framework based on point estimate method and support vector machine is developed. …”
    Get full text
    Get full text
    Get full text
    article
  11. 171
  12. 172
  13. 173

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
  14. 174
  15. 175
  16. 176
  17. 177

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  18. 178

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  19. 179
  20. 180