Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 171 for search '(( element method algorithm ) OR ((( sample using algorithm ) OR ( relevant data algorithm ))))', query time: 0.12s Refine Results
  1. 141

    The effects of data balancing approaches: A case study by Paul Mooijman (4453189)

    Published 2023
    “…In this research, classification algorithms, combined with resampling strategies and dimensionality reduction methods, were investigated to find a prediction model to correctly identify the samples of treated animals. …”
  2. 142

    Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes by Muhammad Mohsin Khan (22150360)

    Published 2025
    “…Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …”
  3. 143

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba Sulaiman (17734065)

    Published 2025
    “…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
  4. 144
  5. 145

    On the protection of power system: Transmission line fault analysis based on an optimal machine learning approach by Md. Sihab Uddin (17542488)

    Published 2022
    “…The design of the proposed framework is done with the goal of reducing computational load and ensuring resilience against source noise, source impedance, fault strength, and sampling frequency variation. The design is carried out based on the selection of the optimal model parameters using a search optimization algorithm called GridSearchCV. …”
  6. 146
  7. 147
  8. 148

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  9. 149

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  10. 150

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 151

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …”
  12. 152

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  13. 153

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…This paper constitutes a small-scale study that used a qualitative method in order to obtain responses to the research question through semi-structured interviews. …”
    Get full text
  14. 154

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…Synthetic Minority Oversampling Technique(SMOTE) and Adaptive Synthetic Sampling(ADASYN) are some of the commonly used techniques to deal with class imbalance. …”
  15. 155

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  16. 156

    Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration by Saideep Pavuluri (21792941)

    Published 2025
    “…Insights from this study can be used for improving pore network models and training machine learning algorithms.…”
  17. 157

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…Then, we systematically summarize commonly available boundary issue solutions into three categories, namely algorithm-based solutions, sampling-strategy-based solutions and iteration-based solutions. …”
  18. 158
  19. 159

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
  20. 160

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article