Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 61 - 80 results of 843 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( from processing algorithms ))))', query time: 0.15s Refine Results
  1. 61
  2. 62
  3. 63

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …”
  4. 64

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy by Haitao Xu (435549)

    Published 2023
    “…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…<p dir="ltr">Monitoring the machining process is crucial for providing cost-effective, high-quality production and preventing unwanted accidents. …”
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 75

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…Different patterns or queries are initially gathered from the input SQL query log, and bootstrap samples are created. …”
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80