Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 221 - 240 results of 712 for search '(( element method algorithm ) OR ((( data processing algorithm ) OR ( based research algorithm ))))', query time: 0.13s Refine Results
  1. 221
  2. 222
  3. 223

    Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques by Abdul Karim (417009)

    Published 2020
    “…In this research, different machine-learning algorithms such as logistic regression, random forest and naïve Bayes were tuned and tested. …”
  4. 224
  5. 225
  6. 226

    A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption by Azadeh, Ali

    Published 2019
    “…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 227
  8. 228

    GIJA:Enhanced geyser‐inspired Jaya algorithm for task scheduling optimization in cloud computing by Abualigah, Laith

    Published 2024
    “…The motivation for this research stems from the increasing demand for efficient resource utilization and task management in cloud computing, driven by the proliferation of Internet of Things (IoT) devices and the growing reliance on cloud‐based services. …”
    Get full text
  9. 229

    Efficient multi-objective neural architecture search framework via policy gradient algorithm by Bo Lyu (16522643)

    Published 2024
    “…<p>Differentiable architecture search plays a prominent role in Neural Architecture Search (NAS) and exhibits preferable efficiency than traditional heuristic NAS methods, including those based on evolutionary algorithms (EA) and reinforcement learning (RL). …”
  10. 230
  11. 231
  12. 232
  13. 233

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
  14. 234
  15. 235

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  16. 236
  17. 237
  18. 238
  19. 239

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  20. 240

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”