Showing 41 - 60 results of 178 for search '(( experimental study algorithm ) OR ((( data code algorithm ) OR ( data could algorithm ))))', query time: 0.13s Refine Results
  1. 41

    Parameter identification of PV solar cells and modules using bio dynamics grasshopper optimization algorithm by Mostafa Jabari (21841727)

    Published 2024
    “…The algorithm's effectiveness is demonstrated through the extraction of parameters for RTC France, PWP201, SM55, KC200GT, and SW255 models, validated against experimental data under diverse conditions. …”
  2. 42

    Fuzzy Logic Adaptive Crow Search Algorithm for MPPT of a Partially Shaded Photovoltaic System by Mohamed Ali Zeddini (22047920)

    Published 2024
    “…Furthermore, a higher value of the fl is preferred to guide the optimization process in the direction of global search, whilst a lower fl value directs the algorithm in the direction of local search. In this regard, this study presents a unique Fuzzy Logic adaptive CSA (FL-CSA) for a freestanding Photovoltaic System (PVS) that is based on a Fuzzy Logic (FL) supervisor. …”
  3. 43
  4. 44

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
  5. 45

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm by Prabu Selvam (22330264)

    Published 2025
    “…Accurately identifying small defects on PCB surfaces remains a considerable challenge, particularly under complex background conditions, due to the intricate and compact layout of the boards. This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
  6. 46

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  7. 47

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  8. 48
  9. 49

    Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain by Jun Zhu (84054)

    Published 2017
    “…The VIIRS Environmental Data Record data (VIIRS_EDR) is produced operationally by NOAA, and is based on the MODIS atmospheric correction algorithm. The “MODIS-like” VIIRS data (VIIRS_ML) are being produced experimentally at NASA, from a version of the “dark-target” algorithm that is applied to MODIS. …”
  10. 50
  11. 51

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…<p dir="ltr">This study examines the use of injection moulding to evaluate mechanical properties in plastic products, such as shear and residual stresses. …”
  12. 52

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure by Mouna Rabhi (17086969)

    Published 2024
    “…In addition, for the same architecture, when both tree arity and cardinality are 4, after 250 epochs, the node load has demonstrated minimal variation and remains in close proximity to the original load. Moreover, experimental results also reveal a graceful degradation of algorithm performance. …”
  13. 53
  14. 54
  15. 55

    Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels by Bernard J. Jansen (7434779)

    Published 2023
    “…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …”
  16. 56

    Variable Selection in Data Analysis: A Synthetic Data Toolkit by Mitra, Rohan

    Published 2024
    “…Lastly, we provide public access to the generated datasets to facilitate bench-marking of new feature selection algorithms in the field via our Github repository. The contributions of this paper aim to foster the development of novel feature selection algorithms and advance their study.…”
    Get full text
    article
  17. 57
  18. 58

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 59

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  20. 60

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”