Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
Showing 201 - 220 results of 643 for search '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( from model algorithm ))))', query time: 0.14s Refine Results
  1. 201

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  2. 202

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  3. 203

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
  4. 204
  5. 205

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  6. 206

    Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy by Aram Rostami (22045274)

    Published 2026
    “…<h3 dir="ltr">Purpose</h3><p dir="ltr">This study aims to compare the dosimetric accuracy between the enhanced leaf model (ELM) in Eclipse V18.0 and the traditional multileaf collimators (MLCs) modelling in Eclipse V16.1 for volumetric modulated arc therapy (VMAT) and stereotactic body radiotherapy (SBRT) treatments. …”
  7. 207

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  8. 208

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm by Prabu Selvam (22330264)

    Published 2025
    “…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
  9. 209

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …”
  10. 210

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
    Get full text
    article
  11. 211

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
  12. 212
  13. 213
  14. 214

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  15. 215
  16. 216

    Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect by Habeeb, Abdallah

    Published 2022
    “…This proposed model has been applied to the Jordanian dialect database, which contains comments from Jordanian telecom company’s customers. …”
    Get full text
  17. 217

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  18. 218

    Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis by Sami Elzeiny (16891521)

    Published 2021
    “…This work leverages the output of wearable technology to provide automatic stress and stressor identification model. In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”
  19. 219
  20. 220