Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 101 - 120 results of 893 for search '(( element network algorithm ) OR ((( data using algorithm ) OR ( based testing algorithm ))))', query time: 0.12s Refine Results
  1. 101
  2. 102

    Online Fuzzy Logic Base Algorithm for Electricity Price Prediction by Albayed, Moamin J.

    Published 2017
    “…The captured parameters are fed to a fuzzy-logic-based algorithm to calculate electric energy prices. …”
    Get full text
    article
  3. 103

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…The values are 18.44 % and 23.9 % for CV-RMSE, 11.6 % and 10.06 % for MAPE, and 7.5 % and 6.75 % for MdAPE, using ANN and GP, respectively. While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…”
  4. 104

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  5. 105

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
    Get full text
    article
  6. 106

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
    Get full text
    article
  7. 107

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  8. 108

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …”
  9. 109

    A static test compaction technique for combinational circuits based on independent fault clustering by Osais, Y.E.

    Published 2003
    “…It is based on a new concept called test vector decomposition. …”
    Get full text
    Get full text
    article
  10. 110

    Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering by El-Maleh, Aiman H.

    Published 2006
    “…In this paper, we present a new static test compaction algorithm based on test vector decomposition and clustering. …”
    Get full text
    article
  11. 111
  12. 112
  13. 113

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 114

    Using genetic algorithms to optimize software quality estimation models by Azar, Danielle

    Published 2004
    “…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 115

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  16. 116

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
  17. 117

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  18. 118
  19. 119
  20. 120