Search alternatives:
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
trained using » brines using (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
trained using » brines using (Expand Search)
-
61
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”
-
62
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
63
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article -
64
-
65
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …”
-
66
Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain
Published 2017“…The VIIRS Environmental Data Record data (VIIRS_EDR) is produced operationally by NOAA, and is based on the MODIS atmospheric correction algorithm. …”
-
67
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
68
Auto-indexing Arabic texts based on association rule data mining. (c2015)
Published 2015“…In this work, we propose a new model to enhance auto-indexing Arabic texts. Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. …”
Get full text
Get full text
masterThesis -
69
-
70
Prediction of EV Charging Behavior Using Machine Learning
Published 2021“…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
Get full text
article -
71
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
Get full text
Get full text
Get full text
masterThesis -
72
-
73
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
74
-
75
Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm?
Published 2021“…The resulting model achieves an 89% predictive accuracy using historical data. …”
-
76
Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods
Published 2022“…In addition, three distinct optimization techniques are used to find the optimum ANN training algorithm: Levenberg–Marquardt, Bayesian Regularization, and Scaled Conjugate Gradient. …”
-
77
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…The implementation nuances involve data and model sharing among allies and partners working on the same domain. …”
Get full text
Get full text
-
78
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…<p>Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a well-trained model can be created to improve the anomaly detection performance. …”
-
79
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
80
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
Published 2019“…Our research relies solely on pre-college and college performance data available in the institutional database. Our research reveals that the Gradient Boosted Trees is a robust algorithm that predicts dropouts with an accuracy of 79.31% and AUC of 88.4% using only pre-enrollment data. …”
Get full text