-
361
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
362
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
Published 2022“…To fully evaluate the learning mechanism of the FSS, it is compared to the underlying GRASP algorithm on a wide range of performance indicators related to convergence, distribution, spread and cardinality.…”
-
363
Indoor Localization Based on Floor Plans and Power Maps
Published 2015“…Numerical simulations and experimental results are presented to evaluate the performance of the proposed algorithm.…”
Get full text
Get full text
Get full text
conferenceObject -
364
Compensation of axle-generator errors due to wheel slip and slide
Published 2002“…Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
Get full text
Get full text
Get full text
article -
365
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
366
-
367
-
368
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. Our main goal is to introduce a new method of OLs discovery that works with fewer data and maintains or improves performance metrics. …”
-
369
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
370
Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem
Published 2025“…Three strategies, namely dominance rules, effective upper bounds, and tandem sequence deduplication, are constructed to accelerate the algorithm’s convergence. To evaluate the performance of the proposed algorithm framework and acceleration strategies, a comprehensive set of 320 instances and a real-world set of 14 instances are generated for rigorous testing. …”
-
371
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
372
An optimal stochastic multivariable PID controller
Published 2019“…Simulation results are included to illustrate the performance capabilities of the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
373
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
Published 2022“…The occurrence of multiple power peaks and their location are highly uncertain in PV systems; this necessitates the use of complex maximum power point tracking algorithms to introduce high voltage oscillations. To address this issue, a new reconfigurable PV array to produce a global maximum power point (GMPP) algorithm close to the Voc regions was introduced. …”
-
374
Towards a Unified Arabic Government Services Chatbot Based on Ontology
Published 2020“…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
Get full text
-
375
Information warfare
Published 2017“…We compare our algorithm with other approaches and show the performance results.…”
Get full text
Get full text
Get full text
Get full text
article -
376
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Experiments comparing our algorithm to both heuristic and exact algorithms demonstrate its effectiveness. …”
Get full text
Get full text
Get full text
conferenceObject -
377
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
378
Graph Contraction for Mapping Data on Parallel Computers
Published 1994“…Finally, we discuss the cost-quality tradeoffs in performing graph contraction.…”
Get full text
Get full text
Get full text
article -
379
Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle
Published 2025“…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …”
Get full text
Get full text
Get full text
masterThesis -
380
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
Get full text