Showing 281 - 300 results of 387 for search 'differences based (algorithms OR algorithm)', query time: 0.06s Refine Results
  1. 281

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Ayesh Marabeh (21142247)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  2. 282

    Robust tuning of power system stabilizers in multimachine powersystems by Abdel-Magid, Y.L.

    Published 2000
    “…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. …”
    Get full text
    Get full text
    article
  3. 283

    Soft Sensor for NOx Emission using Dynamical Neural Network by Shakil, M.

    Published 2020
    “…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …”
    Get full text
    article
  4. 284

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
    Get full text
  5. 285
  6. 286

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 287
  8. 288
  9. 289

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 290

    Heat rate curve approximation for power plants without data measuring devices by Poullikkas, Andreas

    Published 2012
    “…In this work, a numerical method, based on the one-dimensional finite difference technique, is proposed for the approximation of the heat rate curve, which can be applied for power plants in which no data acquisition is available. …”
    Get full text
    article
  11. 291

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …”
    Get full text
    Get full text
    masterThesis
  12. 292

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai by Hamadeh, Moutaz Wajih

    Published 2015
    “…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. Findings indicate that heuristic evaluation techniques are not so helpful in this domain; also, the model has generated interesting clusters about trending topics and events in Dubai. …”
    Get full text
  13. 293
  14. 294

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …”
    Get full text
    Get full text
    Get full text
    article
  15. 295

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…We provide a general keyword query model allowing the user to choose the results’ semantic coverage and expressiveness based on her needs. Different from alternative solutions involving query relaxation, query refinement, or query disambiguation, our approach incorporates semantics at the most basic data indexing level: providing more opportunities toward speedups and semantic coverage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 296

    (k, l)-Clustering for Transactional Data Streams Anonymization by Tekli, Jimmy

    Published 2018
    “…We evaluate our algorithm in terms of utility by considering two different (k, l)-clustering approaches.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 297

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …”
    Get full text
    Get full text
    Get full text
    article
  18. 298
  19. 299

    Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML by Dharmendra Kumar Singh Singh (19517710)

    Published 2022
    “…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …”
  20. 300

    Big Data Energy Management, Analytics and Visualization for Residential Areas by Gupta, Ragini

    Published 2020
    “…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
    Get full text
    article