Search alternatives:
complement component » compliment compliment (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
complement component » compliment compliment (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
441
Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant
Published 2007“…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…”
Get full text
Get full text
article -
442
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
Get full text
Get full text
Get full text
Get full text
article -
443
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015“…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
Get full text
Get full text
masterThesis -
444
Optimizing ADWIN for Steady Streams
Published 2022“…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
Get full text
Get full text
Get full text
-
445
-
446
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
Published 2022“…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
-
447
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
Get full text
-
448
High-order parametrization of the hypergeometric-Meijer approximants
Published 2023“…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …”
-
449
Recovery of business intelligence systems
Published 2018“…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
450
-
451
A forward-backward Kalman for the estimation of time-variant channels in OFDM
Published 2005“…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
Get full text
Get full text
article -
452
Shuffled Linear Regression with Erroneous Observations
Published 2019“…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
453
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
Get full text
Get full text
Get full text
-
454
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
Get full text
-
455
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
456
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
457
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article -
458
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
459
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …”
-
460
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis