Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
tools using » tool using (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 223 for search '(( element method algorithm ) OR ((( data mining algorithm ) OR ( tools using algorithm ))))', query time: 0.10s Refine Results
  1. 141

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
  2. 142
  3. 143

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  4. 144

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  5. 145

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …”
    Get full text
  6. 146

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…In this work we will justify the proposed Localization scheme analytically and provide numerical and experimental data to substantiate our methodology.…”
    Get full text
    Get full text
    masterThesis
  7. 147

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 148

    Dataset built for Arabic Sentiment Analysis by AL MUKHAITI, AYESHA JUMAA SALEM

    Published 2016
    “…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
    Get full text
  9. 149

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures by Ouaiss, Iyad

    Published 2017
    “…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 150
  11. 151

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  12. 152

    Performance Prediction Using Classification by MOOLIYIL, GITA

    Published 2019
    “…The use of classification as a data mining approach for performance prediction has been studied by many eminent researchers. …”
    Get full text
  13. 153

    Design and implementation of a deep learning-empowered m-Health application by Akhan Akbulut (17380285)

    Published 2023
    “…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …”
  14. 154

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  15. 155

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…In this paper, an enhanced binary version of the Rat Swarm Optimizer (RSO) is proposed to deal with Feature Selection (FS) problems. FS is an important data reduction step in data mining which finds the most representative features from the entire data. …”
  16. 156

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
  17. 157

    Multigrid solvers in reconfigurable hardware by Haraty, Ramzi A.

    Published 2008
    “…We analyze the implementation performance using the FPGA vendor's tools. We demonstrate the robustness of Multigrid over other similar iterative solvers, such as Jacobi and successive over relaxation (SOR ), in both hardware and software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 158

    The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis by Ghada Al-Hussain (18295426)

    Published 2022
    “…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …”
  19. 159
  20. 160

    Communications in electronic textile systems by Nakad, Z.

    Published 2017
    “…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject