Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
Showing 321 - 340 results of 620 for search '(( elements method algorithm ) OR ((( based model algorithm ) OR ( data mining algorithm ))))', query time: 0.13s Refine Results
  1. 321

    Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter by Saleh Alhazbi (16869960)

    Published 2020
    “…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
  2. 322
  3. 323
  4. 324

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
  5. 325

    Stability improvement of the PSS-connected power system network with ensemble machine learning tool by M.S. Shahriar (19517536)

    Published 2022
    “…The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
  6. 326
  7. 327
  8. 328

    Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility by Islambouli, Rania

    Published 2019
    “…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 329

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
    Get full text
    Get full text
    article
  10. 330

    A new bi-objective model of the urban public transportation hub network design under uncertainty by Firoozeh Kaveh (14150877)

    Published 2019
    “…For medium and large-sized problems, a meta-heuristic algorithm, namely multi-objective particle swarm optimization is applied and its performance is compared with results from the non-dominated sorting genetic algorithm. …”
  11. 331

    A PLC based power factor controller for a 3-phase induction motor by Al-Ali, A.R.

    Published 2000
    “…This work focuses on the implementation of a laboratory model for a PLC based PFC to improve the power factor of a three-phase induction motor. …”
    Get full text
    Get full text
    article
  12. 332

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 333

    Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends by Abdellatif M. Sadeq (16931841)

    Published 2024
    “…The k-fold cross-validation technique is used for model training, and the developed neural network-based model is used to investigate the effects of operating parameters on the premixed turbulent flames. …”
  14. 334
  15. 335

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. To solve nonlinear differential equations we use Runge-Kutta method of fourth order, and for the minimization part, we use two different methods, namely Nelder-Mead and Model Based Descent methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 336
  17. 337

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  18. 338

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…We utilized parameter optimization techniques, namely Grid Search, Random Search, Bayes Search, Halvin Grid Search, and Halvin Random Search to fine-tune the hyperparameters of our classifier models. Experimental results demonstrated that the CatBoost algorithm achieved the highest level of accuracy (90.42%) in predicting microservice quality.…”
  19. 339

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  20. 340