Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 101 - 120 results of 756 for search '(( element method algorithm ) OR ((( data including algorithm ) OR ( data using algorithm ))))', query time: 0.14s Refine Results
  1. 101
  2. 102

    Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks by Kalash, Saeddin

    Published 2025
    “…We then decompose the problem into two sub-problems where wepropose real-time approaches including (1) data redundancy avoidance and VoI evaluation, and (2) dynamic UAV deployment and position adaptation. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 103

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…To improve the effectiveness and efficiency of the UniBFS algorithm, Redundant Features Elimination algorithm (RFE) is presented in this paper. …”
  4. 104
  5. 105
  6. 106

    Capturing outline of fonts using genetic algorithm and splines by Sarfraz, M.

    Published 2001
    “…Some examples are given to show the results obtained from the algorithm…”
    Get full text
    Get full text
    article
  7. 107
  8. 108
  9. 109

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…A total of eleven hundred experimental data points for nine FPs (two stratified and seven dispersed patterns) in horizontal wellbores are used to develop the MLs. …”
  10. 110
  11. 111
  12. 112

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  13. 113

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 114

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  15. 115

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 116

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions by Liu, Wenpeng

    Published 2017
    “…This paper reviews testing procedures, data analysis, updated algorithms used for joint detection, and discusses the latest round of testing in samples with simulated joints at various angles along the borehole.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 117

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  18. 118
  19. 119
  20. 120