Showing 141 - 160 results of 1,013 for search '(( elements search algorithm ) OR ((( data using algorithm ) OR ( based methods algorithm ))))', query time: 0.22s Refine Results
  1. 141
  2. 142
  3. 143

    Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem by Nezir Aydin (8355378)

    Published 2024
    “…To manage uncertainty and decide effectively, stochastic programming (SP) methods are often employed. Two commonly used SP methods are approximation methods, i.e., Sample Average Approximation (SAA), and decomposition methods, i.e., Progressive Hedging Algorithm (PHA). …”
  4. 144

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm by Saima Hassan (14918003)

    Published 2022
    “…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
  5. 145

    Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm by Abraham Marquez Alcaide (18582451)

    Published 2020
    “…The performance of the EMA-based SHM is presented showing experimental results considering a reduced number of switching angles applied to a specific three-level converter, but the method can be extrapolated to any other three-level converter topology.…”
  6. 146
  7. 147

    Assessment of Drug-Induced QTc Prolongation in Mental Health Practice: Validation of an Evidence-Based Algorithm by Monica Zolezzi (10115698)

    Published 2023
    “…</p></h3><h3>Methods</h3><h3><p dir="ltr">Following an initial face validity by content experts, a cross-sectional survey of mental health care practitioners with a 4-point Likert-type scale was used to assess the validity of the decision steps on the QTcIP algorithm (QTcIPA) by estimating the content validity index (CVI) and the modified kappa statistic (κ*). …”
  8. 148

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 149

    A Fast and Robust Gas Recognition Algorithm Based on Hybrid Convolutional and Recurrent Neural Network by Xiaofang Pan (1895950)

    Published 2019
    “…In order to address this issue, in this paper, we propose a novel hybrid approach with both convolutional and recurrent neural networks combined, which is based on the long short-term memory module. Featuring the capability of learning the correlations of time-series data, the proposed deep learning method is well-suited for extracting the valuable transient feature contained in the very beginning of the response curve. …”
  10. 150

    Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models by Theng, Lau Wei

    Published 2022
    “…Deep learning is the most promising algorithm compared to another Machine Learning (ML) algorithm. …”
    Get full text
  11. 151
  12. 152

    Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques by Abu Zitar, Raed

    Published 2022
    “…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
    Get full text
  13. 153

    A Review of the Genetic Algorithm and JAYA Algorithm Applications by Abu Zitar, Raed

    Published 2022
    “…On the other a well-known and somewhat older evolutionary based method called the Genetic Algorithm with applications is also presented here. …”
    Get full text
  14. 154

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  15. 155

    FarmTech: Regulating the use of digital technologies in the agricultural sector by Imad Antoine Ibrahim (14158998)

    Published 2023
    “…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
  16. 156

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
  17. 157

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark by Ameema Zainab (16864263)

    Published 2021
    “…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
  18. 158

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…Moreover, the results of MGWO are compared with seven state-of-art gene selection methods using the same datasets based on classification accuracy and the number of selected genes. …”
    Get full text
  19. 159

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  20. 160