Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
data model » data models (Expand Search)
Showing 321 - 340 results of 472 for search '(( elements method algorithm ) OR ((( data model algorithm ) OR ( based mining algorithm ))))*', query time: 0.13s Refine Results
  1. 321

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…We compare the performance and accuracy to previous results in the cases when numerical data is available and also in the case of several model problems where exact results are available.…”
    Get full text
    Get full text
    Get full text
    article
  2. 322
  3. 323

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements by Emara-Shabaik, Husam

    Published 2020
    “…A model is proposed to identify the parameters of a class of stochastic nonlinearsystems. …”
    Get full text
    article
  4. 324

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 325

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article
  6. 326

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…It depends mainly on the actuating error signal, and it has a variable step size of the CMPN. The detailed modeling of the whole system is presented, including measured wind speed data, detailed switching techniques, a drive train model of the turbine, and real SMESD. …”
    Get full text
    Get full text
    Get full text
    article
  7. 327

    Digital Image Watermarking Using Balanced Multiwavelets by Ghouti, L.

    Published 2006
    “…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
    Get full text
    article
  8. 328

    High-order parametrization of the hypergeometric-Meijer approximants by Abouzeid M. Shalaby (16329062)

    Published 2023
    “…We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …”
  9. 329
  10. 330

    EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach by Muhammad Adeel Asghar (6724982)

    Published 2019
    “…Features extracted from the proposed BoDF model have considerably smaller dimensions. The proposed model achieves better classification accuracy compared to the recently reported work when validated on SJTU SEED and DEAP data sets. …”
  11. 331
  12. 332

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Therefore, the proposed work intends to implement a group of novel methodologies for developing an effective Cyborg intelligence security model to secure smart city systems. Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
  13. 333

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  14. 334

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…We compare the performance and accuracy to previous results in the cases when numerical data is available and also in the case of several model problems where exact results are available.…”
  15. 335

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…Real data from a boiler plant is used to develop the model. …”
    Get full text
    masterThesis
  16. 336

    Electric Vehicles Charging Station Load Forecasting Integration With Renewable Energy Using Novel Deep EfficientBiLSTMNet by Vineet Dhanawat (22361395)

    Published 2025
    “…The model’s hyperparameters are optimized using an Enhanced Firefly Algorithm (EFA). …”
  17. 337
  18. 338

    Parallel processing by Mansour, Nashat

    Published 2005
    “…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 339

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 340

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject