Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 781 - 800 results of 880 for search '(( element updated algorithm ) OR ((( data processing algorithm ) OR ( model using algorithm ))))', query time: 0.12s Refine Results
  1. 781
  2. 782
  3. 783

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  4. 784

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…Many metrics have been proposed to assess these software attributes and for this purpose, prediction models have been widely used. However, in almost all cases, these models were not efficient when used to predict the quality characteristics (stability or other) of new unseen software as their prediction accuracy decreases significantly. …”
    Get full text
    Get full text
    Get full text
    article
  5. 785
  6. 786
  7. 787

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
    Get full text
  8. 788
  9. 789

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  10. 790
  11. 791
  12. 792
  13. 793

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
  14. 794

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …”
  15. 795

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem by Abu Zitar, Raed

    Published 2021
    “…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …”
    Get full text
  16. 796

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic by Saeed Al-Maroof, Rana

    Published 2020
    “…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
    Get full text
    Get full text
  17. 797

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  18. 798

    A Multi-Channel Convolutional Neural Network approach to automate the citation screening process by Raymon van Dinter (10521952)

    Published 2021
    “…This study aims to automate the citation screening process using Deep Learning algorithms. With this, it is aimed to reduce the time and costs of the citation screening process and increase the precision and recall of the relevant primary studies. …”
  19. 799

    A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks by Yassine Himeur (14158821)

    Published 2022
    “…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. …”
  20. 800

    Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC by Abbas, Nadine

    Published 2022
    “…Compared to conventional and state-of-the-art system models, results show the effectiveness of the proposed schemes and provide useful insights into the tradeoffs between the number of completed tasks, energy consumption and monetary cost.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article