Search alternatives:
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 61 - 80 results of 751 for search '(( elements method algorithm ) OR ((( data models algorithm ) OR ( data using algorithm ))))*', query time: 0.16s Refine Results
  1. 61

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
    Get full text
  2. 62
  3. 63

    Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence by Al Rayhi, Nasser

    Published 2020
    “…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
    Get full text
  4. 64

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  5. 65

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 66

    Allocation and re-allocation of data in a grid using an adaptive genetic algorithm by Mansour, N.

    Published 2006
    “…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 67

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy by Haitao Xu (435549)

    Published 2023
    “…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
  8. 68

    Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain by Jun Zhu (84054)

    Published 2017
    “…The aerosol model used in VIIRS_EDR algorithm shows that dust and clean urban models were the dominant model types during the evaluation period. …”
  9. 69

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
  10. 70

    Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment by Farhat Mahmood (15468854)

    Published 2023
    “…First, an analytical model based on mass and energy balance and a data-driven model based on an artificial neural network is developed, and their prediction performance is compared. …”
  11. 71

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm by Saima Hassan (14918003)

    Published 2022
    “…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
  12. 72

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 73
  14. 74

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  15. 75
  16. 76

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology by Senyuk, Mihail

    Published 2023
    “…Features of transmission line maintenance were used to increase accuracy of estimation. Algorithms were tested using the test power system IEEE39. …”
    Get full text
    article
  17. 77
  18. 78

    Parameter identification of PV solar cells and modules using bio dynamics grasshopper optimization algorithm by Mostafa Jabari (21841727)

    Published 2024
    “…The study evaluates the BDGOA by applying it to identify unknown parameters of five solar modules. The algorithm's effectiveness is demonstrated through the extraction of parameters for RTC France, PWP201, SM55, KC200GT, and SW255 models, validated against experimental data under diverse conditions. …”
  19. 79
  20. 80

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …”
    Get full text