Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
Showing 121 - 140 results of 753 for search '(( elements method algorithm ) OR ((( data using algorithms ) OR ( phase model algorithm ))))', query time: 0.12s Refine Results
  1. 121
  2. 122

    Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm by Abdelbasset Krama (16870008)

    Published 2018
    “…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …”
  3. 123

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
  4. 124

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  5. 125

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  6. 126
  7. 127

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  8. 128
  9. 129

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 130
  11. 131
  12. 132

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  13. 133
  14. 134

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  15. 135

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  16. 136
  17. 137

    Predictive modelling in times of public health emergencies: patients’ non-transport decisions during the COVID-19 pandemic by Hassan Farhat (9000509)

    Published 2025
    “…</p><h3>Methods</h3><p dir="ltr">Using Python® programming language, this study employed various supervised machine-learning algorithms, including parametric probabilistic models, such as logistic regression, and non-parametric models, including decision trees, random forest (RF), extra trees, AdaBoost, and k-nearest neighbours (KNN), using a dataset of non-transported patients (refused transport and did not receive treatment versus those who refused transport and received treatment) between 2018 and 2022. …”
  18. 138

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 by Al-Manaseer, Hitham

    Published 2022
    “…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …”
    Get full text
  19. 139

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  20. 140

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning by Md Nazmul Islam Shuzan (21842426)

    Published 2024
    “…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …”