-
281
The automation of the development of classification models and improvement of model quality using feature engineering techniques
منشور في 2023"…In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the performance of different prediction models and select the best final model based on predefined parameters. …"
-
282
Identification of phantom movements with an ensemble learning approach
منشور في 2022"…In the current study, we utilized ensemble learning algorithms for the recognition and classification of phantom movements of the different amputation levels of the upper and lower extremity. …"
-
283
Development and Implementation of a Hybrid Intelligent Controller for Interior Permanent Magnet Synchronous Motor Drives
منشور في 2004"…In this work, initially different operating conditions are obtained based on motor dynamics incorporating uncertainties. …"
احصل على النص الكامل
article -
284
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
منشور في 2025"…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"
-
285
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
منشور في 2025"…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"
-
286
Robust tuning of power system stabilizers in multimachine powersystems
منشور في 2000"…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
287
Soft Sensor for NOx Emission using Dynamical Neural Network
منشور في 2020"…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …"
احصل على النص الكامل
article -
288
The Effects of Data Mining on Small Businesses in Dubai
منشور في 2011"…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …"
احصل على النص الكامل
-
289
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
منشور في 2023احصل على النص الكامل
doctoralThesis -
290
Computational evluation of protein energy functions
منشور في 2014"…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
291
-
292
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
منشور في 2015احصل على النص الكامل
doctoralThesis -
293
Genetic Fuzzimetric Technique (GFT)
منشور في 2012"…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
294
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
295
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
منشور في 2015"…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. Findings indicate that heuristic evaluation techniques are not so helpful in this domain; also, the model has generated interesting clusters about trending topics and events in Dubai. …"
احصل على النص الكامل
-
296
-
297
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
298
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
منشور في 2018"…We provide a general keyword query model allowing the user to choose the results’ semantic coverage and expressiveness based on her needs. Different from alternative solutions involving query relaxation, query refinement, or query disambiguation, our approach incorporates semantics at the most basic data indexing level: providing more opportunities toward speedups and semantic coverage. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
299
(k, l)-Clustering for Transactional Data Streams Anonymization
منشور في 2018"…We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
300
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article