بدائل البحث:
lasso algorithm » carlo algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
lasso algorithm » carlo algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
level using » level fusion (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
-
81
A Framework for Predictive Modeling in Sustainable Projects
منشور في 2012احصل على النص الكامل
doctoralThesis -
82
Simultaneous stabilisation of power systems using geneticalgorithms
منشور في 1997"…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
83
Cyberbullying Detection in Arabic Text using Deep Learning
منشور في 2023"…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
احصل على النص الكامل
-
84
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
منشور في 2022"…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.…"
-
85
A Survey of Data Clustering Techniques
منشور في 2023"…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
86
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…Further, no indication is given of how close the trace is to termination—a highly relevant measure in a streaming setting. This paper introduces a novel approximate streaming conformance checking algorithm that enriches prefix-alignments with confidence and completeness measures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
87
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …"
احصل على النص الكامل
article -
88
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
89
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
90
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
منشور في 2020"…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …"
-
91
-
92
-
93
FPGA-Based Network Traffic Classification Using Machine Learning
منشور في 2020"…Classification approaches based on machine learning techniques have shown promising results with high levels of accuracy. In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. …"
احصل على النص الكامل
article -
94
An efficient approach for textual data classification using deep learning
منشور في 2022"…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
-
95
FPGA-Based Network Traffic Classification Using Machine Learning
منشور في 2019احصل على النص الكامل
doctoralThesis -
96
A Graph Heuristic Approach for the Data Path Allocation Problem
منشور في 2022"…To optimize this allocation problem, a variation of the Fiduccia-Mattheyses (FM) algorithm is presented. The algorithm starts with a schedule as input and partitions it into available hardware resources using a modifi ed version of the Fiduccia-Mattheyses algorithm to t the datapath allocation problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
97
Boosting the visibility of services in microservice architecture
منشور في 2023"…Experimental results demonstrated that the CatBoost algorithm achieved the highest level of accuracy (90.42%) in predicting microservice quality.…"
-
98
Nested ensemble selection: An effective hybrid feature selection method
منشور في 2023"…It has been shown that while feature selection algorithms are able to distinguish between relevant and irrelevant features, they fail to differentiate between relevant and redundant and correlated features. …"
احصل على النص الكامل
article -
99
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. The usability of the proposed framework is evaluated using the System Usability Scale (SUS) resulting in overall high acceptability levels across all users. …"
احصل على النص الكامل
-
100
Joint distributed synchronization and positioning in UWB ad hoc networks using TOA
منشور في 2006"…Finally, the proposed distributed maximum log-likelihood algorithm proves to preserve a reasonable level of complexity in each node by approximating asynchronously the positive gradient direction of the log-likelihood function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article