Showing 201 - 220 results of 401 for search '(( elements new algorithm ) OR ((( case control algorithm ) OR ( data processing algorithm ))))', query time: 0.14s Refine Results
  1. 201

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  2. 202
  3. 203

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  4. 204
  5. 205

    The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control by Yasen Harrye (22415632)

    Published 2023
    “…<p dir="ltr">The main objective of this paper is to provide a thorough analysis of currently used modulation control schemes for single-phase bidirectional dual active bridge DC/DC converters. …”
  6. 206
  7. 207
  8. 208

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
    Get full text
    Get full text
    Get full text
  9. 209

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  10. 210

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 211

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
    Get full text
  12. 212

    A combined resource allocation framework for PEVs charging stations, renewable energy resources and distributed energy storage systems by Kandil, Sarah M.

    Published 2017
    “…The formulation is decomposed into two interdependent sub-problems and solved using a combination of metaheuristic and deterministic optimization techniques. A sample case study is presented to illustrate the performance of the algorithm.…”
    Get full text
    article
  13. 213

    Stability improvement of the PSS-connected power system network with ensemble machine learning tool by M.S. Shahriar (19517536)

    Published 2022
    “…The first system is a single-machine infinite bus power system, while the second is a unified power flow controller (UPFC) device. The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
  14. 214

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …”
  15. 215

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
  16. 216

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …”
  17. 217

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
    Get full text
  18. 218

    Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids by Ahmed Ouammi (14151039)

    Published 2021
    “…The algorithm has been tested through a case study to demonstrate its performance and effectiveness.…”
  19. 219
  20. 220

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text