Search alternatives:
method algorithm » mould algorithm (Expand Search)
groups algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 101 - 120 results of 320 for search '(( element method algorithm ) OR ((( data including algorithm ) OR ( data groups algorithm ))))', query time: 0.11s Refine Results
  1. 101

    Prediction of EV Charging Behavior Using Machine Learning by Shahriar, Sakib

    Published 2021
    “…Therefore, in this paper we propose the usage of historical charging data in conjunction with weather, traffic, and events data to predict EV session duration and energy consumption using popular machine learning algorithms including random forest, SVM, XGBoost and deep neural networks. …”
    Get full text
    article
  2. 102
  3. 103

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks by Najam Us Sahar Riyaz (22927843)

    Published 2025
    “…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
  4. 104

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study by Mutasim Baba, Fuad

    Published 2022
    “…This paper presents a robust automated methodology that can calibrate a building simulation model based on the indoor hourly temperature in multiple rooms simultaneously with high accuracy. This methodology includes a variance-based sensitivity analysis to determine building parameters that significantly influence indoor air temperatures, the Multi-Objective Genetic Algorithm to calibrate different rooms simultaneously based on the significant param eters identified by the sensitivity analysis, and new evaluation criteria to achieve a high-accuracy calibrated model. …”
    Get full text
    Get full text
    Get full text
  5. 105

    Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks by Kalash, Saeddin

    Published 2025
    “…We then decompose the problem into two sub-problems where wepropose real-time approaches including (1) data redundancy avoidance and VoI evaluation, and (2) dynamic UAV deployment and position adaptation. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 106

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  7. 107
  8. 108

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
  9. 109
  10. 110

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 111

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms by Abdelouahed Hamdi (14158899)

    Published 2022
    “…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. The efficient boundary of the PSO algorithm was higher than that of the ICA algorithm, and it displayed more efficient portfolios.Therefore, this algorithm was more successful in optimizing the portfolio.…”
  12. 112
  13. 113
  14. 114

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes by Muhammad Mohsin Khan (22150360)

    Published 2025
    “…In the first stage, we performed binary classification, grouping SAH severity into “Good Outcome” (class 0), which includes MRS levels 0, 1, 2, and 3, and “Poor Outcome” (class 1), encompassing levels 4, 5, and 6. …”
  15. 115

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  16. 116

    Detecting sleep outside the clinic using wearable heart rate devices by Ignacio Perez-Pozuelo (14153007)

    Published 2022
    “…We evaluated it on four study cohorts using different research- and consumer-grade devices for over 2000 nights. Recording periods included both 24 h free-living and conventional lab-based night-only data. …”
  17. 117

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark by Ameema Zainab (16864263)

    Published 2021
    “…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
  18. 118
  19. 119

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…Magnetic resonance imaging data were most commonly used for classifying bipolar patients compared to other groups (11, 34%), whereas microarray expression data sets and genomic data were the least commonly used. …”
  20. 120

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”