Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data finding » data hiding (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data finding » data hiding (Expand Search)
-
81
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
82
-
83
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…One of the prominent challenges lies in the presence of barren plateaus (BP) in QML algorithms, particularly in quantum neural networks (QNNs). …”
-
84
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text
Get full text
-
85
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
Get full text
-
86
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…The graph-based methods are one of the most important approaches for finding OLs in OSNs. Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
87
A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates
Published 2024“…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
Get full text
article -
88
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…To solve it, we first propose the high-complexity branch, reduce and bound (BRB) algorithm to find the global optimal solution for relatively small scale scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
89
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
Get full text
Get full text
-
90
Automatic keyword extraction from a real estate classifieds data set
Published 2011“…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …”
Get full text
-
91
-
92
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…The proposed framework comprises key elements: Important Decisions derived from interviews with transportation leaders, Knowledge Management enhanced by AI algorithms, Data Mining/Analysis utilizing historical data, the Fleet Management System employing Oracle ERP, and a Data-Driven Decision Support Framework that leans towards the extended framework approach. …”
Get full text
-
93
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
Published 2019“…Findings Production, import, export, road construction and price are considered as the input data used in the present study. …”
Get full text
Get full text
Get full text
Get full text
article -
94
-
95
-
96
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
97
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
98
-
99
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
100