Showing 101 - 120 results of 341 for search '(( elements per algorithm ) OR ((( data processing algorithm ) OR ( text processing algorithm ))))', query time: 0.13s Refine Results
  1. 101

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  2. 102
  3. 103
  4. 104
  5. 105
  6. 106

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 107

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 108

    The effects of data balancing approaches: A case study by Paul Mooijman (4453189)

    Published 2023
    “…Our results showed that the replacement method was effective, and LogisticRegression combined with the oversampling algorithms SMOTE or ADASYN, GaussianProcessClassifier with the oversampling algorithm SMOTE, and LinearDiscriminantAnalysis were the best performing models after log transformation of the dataset was followed by Recursive Feature Elimination.…”
  9. 109

    Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information by M. Ghoniem, Rania

    Published 2019
    “…In all likelihood, while features from several modalities may enhance the classification performance, they might exhibit high dimensionality and make the learning process complex for the most used machine learning algorithms. …”
    Get full text
    Get full text
  10. 110
  11. 111

    Big Data Energy Management, Analytics and Visualization for Residential Areas by Gupta, Ragini

    Published 2020
    “…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
    Get full text
    article
  12. 112
  13. 113
  14. 114
  15. 115

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…The proposed method, named Eye-means, emulates the natural ocular process of estimating initial centroids. To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 116

    Deep Learning-Based Short-Term Load Forecasting Approach in Smart Grid With Clustering and Consumption Pattern Recognition by Dabeeruddin Syed (16864260)

    Published 2021
    “…Whilst different models are proposed for STLF, they are based on small historical datasets and are not scalable to process large amounts of big data as energy consumption data grow exponentially in large electric distribution networks. …”
  17. 117

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
    Get full text
    Get full text
  18. 118
  19. 119
  20. 120