Search alternatives:
using algorithm » cosine algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
Showing 101 - 120 results of 1,014 for search '(( elements network algorithm ) OR ((( data using algorithm ) OR ( based methods algorithm ))))', query time: 0.15s Refine Results
  1. 101

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
    Get full text
    article
  2. 102

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
    Get full text
    article
  3. 103
  4. 104

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 105

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  6. 106

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  7. 107

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…<p dir="ltr">Fault detection and diagnosis (FDD) systems play a crucial role in maintaining the adequate execution of the monitored process. One of the widely used data-driven FDD methods is the Principal Component Analysis (PCA). …”
  8. 108

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System by Abualigah, Laith

    Published 2023
    “…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …”
    Get full text
  9. 109

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 110
  11. 111

    Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm by Ali S. Alghamdi (17541711)

    Published 2023
    “…The proposed IARO-based scheduling framework’s performance is evaluated against that of traditional ARO, particle swarm optimization (PSO), and salp swarm algorithm (SSA). …”
  12. 112

    Using genetic algorithms to optimize software quality estimation models by Azar, Danielle

    Published 2004
    “…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 113

    Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review by Zainab Jan (17306614)

    Published 2023
    “…</p><h3>Conclusions </h3><p dir="ltr">This review presents an overview of studies based on AI models and algorithms used to predict and diagnose pancreatic cancer patients. …”
  14. 114
  15. 115

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  16. 116

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
  17. 117
  18. 118

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  19. 119

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  20. 120