Search alternatives:
method algorithm » mould algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 181 - 200 results of 796 for search '(( elements method algorithm ) OR ((( each model algorithm ) OR ( data using algorithm ))))', query time: 0.15s Refine Results
  1. 181

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting by Mohamed Massaoudi (16888710)

    Published 2021
    “…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
  2. 182

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  3. 183

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  4. 184
  5. 185

    Algorithmic Study of Online Multi-Facility Location Problems by Markarian, Christine

    Published 2022
    “…Many variants of FL have been known, appearing as sub-problems in many applications in computer science, management science, and operations research. Most FL models studied thus far assume that clients need to be served by connecting each to one facility. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 186
  7. 187

    Convergence behavior of the normalized least mean fourth algorithm by Zerguine, A.

    Published 2000
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    Get full text
    Get full text
    article
  8. 188

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 189

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
    Get full text
    Get full text
  10. 190

    Three-phase simulated annealing algorithms for exam scheduling by Mansour, Nashat

    Published 2003
    “…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 191

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
    Get full text
  12. 192
  13. 193

    The effects of data balancing approaches: A case study by Paul Mooijman (4453189)

    Published 2023
    “…In this article, we present a case study approach for investigating the effects of data balancing approaches. The case study concerns the discrimination between growth hormone treated and non-treated animals using Liquid Chromatography-High Resolution Mass Spectrometry (LC-HRMS) data. …”
  14. 194

    A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS by Zerguine, Azzedine

    Published 2020
    “…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …”
    Get full text
    article
  15. 195

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 196

    Social spider optimization algorithm: survey and new applications by Abualigah, Laith

    Published 2024
    “…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
    Get full text
  17. 197
  18. 198
  19. 199

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices by Aya Hasan Alkhereibi (17151070)

    Published 2025
    “…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …”
  20. 200

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture by Moutaz Alazab (17730060)

    Published 2025
    “…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”