Search alternatives:
complementing ii » implementing iot (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
complementing ii » implementing iot (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
-
21
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…In fact, SAR is the only satellite-based technology able to detect buried artefacts from space, and it is expected that fine-resolution images of ALOS/PALSAR-2 (L-band SAR) would be able to detect large features (>1 m) that might be buried in the subsurface (<2 m) under optimum conditions, i.e., dry and bare soil. …”
Get full text
article -
22
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
23
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
24
-
25
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
26
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
Get full text
Get full text
article -
27
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
28
-
29
A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand
Published 2023“…The solution approaches included the genetic algorithm (GA), particle swarm optimization (PSO), and the non-dominated sorting genetic algorithm (NSGA-II). …”
-
30
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
31
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
32
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
33
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
34
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
35
A new approach and faster exact methods for the maximum common subgraph problem
Published 2017“…This structure contains a large number of naturally-ordered cliques that are present in the association graph’s complement. A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
36
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …”
Get full text
-
37
A novel technique for fast multiplication
Published 2020“…These partial products are then added using a tree of carry-save-adders, and ® nally the sum and carry vectors are added using a carry-lookahead adder. In the case of 2 s complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. …”
Get full text
article -
38
A novel technique for fast multiplication
Published 1995“…These partial products are then added using a tree of carry-save-adders, and finally the sum and carry vectors are added using a carry-look-ahead adder. In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. …”
Get full text
Get full text
article -
39
-
40
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”