Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
iot algorithm » rd algorithm (Expand Search)
Showing 41 - 60 results of 377 for search '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( based iot algorithm ))))*', query time: 0.14s Refine Results
  1. 41
  2. 42

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  3. 43
  4. 44
  5. 45

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    “…Conformance checking compares a process model and recorded executions of a process, i.e., a log of traces. …”
    Get full text
    Get full text
    Get full text
  6. 46

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
    Get full text
    Get full text
    masterThesis
  7. 47
  8. 48

    Correlation Clustering via s-Club Cluster Edge Deletion by Makarem, Norma

    Published 2023
    Subjects: “…Cluster analysis -- Data processing…”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 49
  10. 50
  11. 51

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…A spamicity score was awarded to each of the IoT devices by the algorithm, based on the feature importance and the root mean square error score of the machine learning models to determine the trustworthiness of the device in the home network. …”
  12. 52

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  13. 53

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering by Abu Zitar, Raed

    Published 2022
    “…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
  14. 54
  15. 55
  16. 56
  17. 57

    Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm by Odat, Alhaj-Saleh A.

    Published 2024
    “…Additionally, these data can be readily applied to compare algorithmic results referenced by (Babu, T.S. et al., 2015; PrasanthRam, J. et al., 2017) [2,3], and contribute to the development of new processes for practical applications.…”
    Get full text
    Get full text
    Get full text
    article
  18. 58
  19. 59

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
    Get full text
    article
  20. 60

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
    Get full text
    Get full text
    Get full text
    masterThesis