Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 121 - 140 results of 834 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( from testing algorithm ))))', query time: 0.16s Refine Results
  1. 121

    Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control by Farhat Mahmood (15468854)

    Published 2021
    “…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …”
  2. 122
  3. 123

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study by Mutasim Baba, Fuad

    Published 2022
    “…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…”
    Get full text
    Get full text
    Get full text
  4. 124

    Incremental Genetic Algorithm by Mansour, Nashat

    Published 2006
    “…Classical Genetic Algorithms (CGA) are known to find good sub-optimal solutions for complex and intractable optimization problems. …”
    Get full text
    Get full text
    article
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129
  10. 130
  11. 131

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …”
    Get full text
  12. 132

    Robustness testing of composed real-time systems by Fouchal, Hacène

    Published 2010
    “…Each tester is dedicated to test a single SUT component. A test execution algorithm is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 133
  14. 134

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 135

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…Regression test selection determines a subset of test cases, from the initial test suite, which concentrates on the parts of the system affected by the modification. …”
    Get full text
    Get full text
    Get full text
    article
  16. 136
  17. 137

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  18. 138

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  19. 139

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  20. 140