Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 461 - 480 results of 742 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( data testing algorithm ))))', query time: 0.11s Refine Results
  1. 461

    Stability and Numerical Solutions of Second Wave Mathematical Modeling on COVID-19 and Omicron Outbreak Strategy of Pandemic: Analytical and Error Analysis of Approximate Series So... by Ashwin Muniyappan (19570051)

    Published 2022
    “…The algorithm guidelines are used for international arrivals, with Omicron variant cases updated by the Union Health Ministry in January 2022. …”
  2. 462

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…Magnetic resonance imaging data were most commonly used for classifying bipolar patients compared to other groups (11, 34%), whereas microarray expression data sets and genomic data were the least commonly used. …”
  3. 463

    An Optimal Approach for Assessing Weibull Parameters and Wind Power Potential for Six Coastal Cities in Pakistan by Ghulam Abbas (764241)

    Published 2024
    “…In this research, we have ameliorated the performance of the recently-introduced novel energy pattern factor method (NEPFM) via a direct search algorithm, i.e., simplex search algorithm (SSA). We designate the resulting algorithm as NEPFM-SSA as it took NEPFM’s Weibull distribution parameters as an initial guess and retuned them with the help of the simplex search algorithm to get updated Weibull distribution parameters, which ensure better fitting characteristics. …”
  4. 464

    A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting by Maissa Boukaf (22282279)

    Published 2024
    “…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …”
  5. 465

    An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication by Syed Muhammad Amrr (16855557)

    Published 2019
    “…<p>The attitude regulation of spacecraft using continuous time execution of the control law is not always affordable for the low-cost satellites with limited wireless resources. …”
  6. 466

    A Survey of Machine Learning Innovations in Ambulance Services: Allocation, Routing, and Demand Estimation by Reem Tluli (22282702)

    Published 2024
    “…<p dir="ltr">In the realm of Emergency Medical Services (EMS), the integration of Machine Learning (ML) techniques has emerged as a catalyst for revolutionizing ambulance operations. ML algorithms could play a pivotal role in dynamically allocating resources, devising efficient routes, and predicting demand patterns. …”
  7. 467

    Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas by Marwan Dhuheir (19170898)

    Published 2024
    “…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
  8. 468
  9. 469

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  10. 470

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 471

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  12. 472

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  13. 473

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…Finally, the algorithm is stress tested for performance using a simulation of high-traffic event streams.…”
    Get full text
    Get full text
    Get full text
  14. 474

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…A case study using real population and transportation network data was tested using the proposed methodology. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 475

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  16. 476

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  17. 477
  18. 478

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
  19. 479
  20. 480

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
    Get full text