Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
Showing 41 - 60 results of 417 for search '(( element method algorithm ) OR ((( data processing algorithm ) OR ( data finding algorithm ))))*', query time: 0.12s Refine Results
  1. 41
  2. 42
  3. 43

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  4. 44

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  5. 45

    A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption by Azadeh, Ali

    Published 2019
    “…Findings Production, import, export, road construction and price are considered as the input data used in the present study. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
    Get full text
    article
  12. 52
  13. 53
  14. 54
  15. 55

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  16. 56

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    “…Conformance checking compares a process model and recorded executions of a process, i.e., a log of traces. …”
    Get full text
    Get full text
    Get full text
  17. 57
  18. 58

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
    Get full text
    Get full text
    masterThesis
  19. 59
  20. 60