Search alternatives:
data finding » data mining (Expand Search), data hiding (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
-
121
Scatter search technique for exam timetabling
Published 2011“…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
Get full text
Get full text
Get full text
article -
122
Soft Sensor for NOx Emission using Dynamical Neural Network
Published 2020“…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …”
Get full text
article -
123
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …”
Get full text
-
124
Final exams scheduling for univeristies. (c2001)
Published 2001Get full text
Get full text
masterThesis -
125
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
Published 2022“…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
-
126
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
127
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
128
Innovative mobile E-healthcare systems
Published 2016“…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
article -
129
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Therefore, in this study, we find the turning points (i.e., toxicity triggers) making conversations toxic. …”
-
130
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
131
-
132
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
-
133
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
Published 2022“…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …”
-
134
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
135
-
136
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
137
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
138
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…A conjugate heat transfer model for a 3S2P pouch cell module (20 Ah LiFePO₄) is developed and validated against experimental data (< 2% error). The CFD model of a battery module is developed to train an ultra-fast metamodel for battery geometry optimisation. …”
-
139
Performance Modeling of Rooftop PV Systems in Arid Climate, a Case Study for Qatar: Impact of Soiling Losses and Albedo Using PVsyst and SAM
Published 2025“…The optimized approach reduced the root mean square error (RMSE) of predicted soiling ratios from 7.30 to 1.93 and improved the agreement between simulated and measured monthly energy yields for 2024, achieving normalized RMSE values of 4.66% in SAM and 4.86% in PVsyst. The findings demonstrate that coupling data-driven soiling optimization with refined albedo representation modernizes the predictive capabilities of PVsyst and SAM, yielding more reliable performance forecasts. …”
-
140
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article