Showing 81 - 100 results of 486 for search '(( experimental analysis algorithm ) OR ((( data code algorithm ) OR ( data modeling algorithm ))))', query time: 0.13s Refine Results
  1. 81

    Prediction of EV Charging Behavior Using Machine Learning by Shahriar, Sakib

    Published 2021
    “…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
    Get full text
    article
  2. 82

    Label dependency modeling in Multi-Label Naïve Bayes through input space expansion by PKA Chitra (21749216)

    Published 2024
    “…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. We subject our enhanced iMLNB model to a rigorous empirical evaluation, utilizing six benchmark datasets. …”
  3. 83
  4. 84

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…A 3D finite element model was first developed and validated against available experimental results. The developed model is then used to conduct a sensitivity analysis considering five factors that influence the shear behavior of BFRC-BFRP one-way slabs. …”
  5. 85

    Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models by AL SHAMSI, ARWA AHMED

    Published 2023
    “…Once the dataset was constructed and validated, I then conducted a performance evaluation and comparison of various basic Machine Learning algorithms, Deep Learning models, and stacking deep learning models on different datasets of Sentiment Analysis of Arabic Dialects. …”
    Get full text
  6. 86

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Multiple models have been proposed and different techniques and data structures were used. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 87
  8. 88
  9. 89
  10. 90

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  11. 91
  12. 92
  13. 93
  14. 94

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy by Haitao Xu (435549)

    Published 2023
    “…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
  15. 95
  16. 96

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…”
  17. 97
  18. 98

    Predict Student Success and Performance factors by analyzing educational data using data mining techniques by ATIF, MUHAMMAD

    Published 2022
    “…The research study is performed as experimental analysis and develop models from nine machine learning algorithms including KNN, Naïve Bayes, SVM, Logistic regression, Decision Tree, Random forest, Adaboost, Bagging Classifier, and voting Classifier. …”
    Get full text
  19. 99

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  20. 100