-
281
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
Published 2025“…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
-
282
Robust tuning of power system stabilizers in multimachine powersystems
Published 2000“…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. …”
Get full text
Get full text
article -
283
Soft Sensor for NOx Emission using Dynamical Neural Network
Published 2020“…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …”
Get full text
article -
284
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
Get full text
-
285
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
286
Computational evluation of protein energy functions
Published 2014“…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
Get full text
Get full text
Get full text
conferenceObject -
287
-
288
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
289
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
290
Heat rate curve approximation for power plants without data measuring devices
Published 2012“…In this work, a numerical method, based on the one-dimensional finite difference technique, is proposed for the approximation of the heat rate curve, which can be applied for power plants in which no data acquisition is available. …”
Get full text
article -
291
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …”
Get full text
Get full text
masterThesis -
292
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. Findings indicate that heuristic evaluation techniques are not so helpful in this domain; also, the model has generated interesting clusters about trending topics and events in Dubai. …”
Get full text
-
293
-
294
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …”
Get full text
Get full text
Get full text
article -
295
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…We provide a general keyword query model allowing the user to choose the results’ semantic coverage and expressiveness based on her needs. Different from alternative solutions involving query relaxation, query refinement, or query disambiguation, our approach incorporates semantics at the most basic data indexing level: providing more opportunities toward speedups and semantic coverage. …”
Get full text
Get full text
Get full text
Get full text
article -
296
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018“…We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
297
Common weaving approach in mainstream languages for software security hardening
Published 2013“…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …”
Get full text
Get full text
Get full text
article -
298
-
299
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
Published 2022“…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …”
-
300
Big Data Energy Management, Analytics and Visualization for Residential Areas
Published 2020“…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
Get full text
article