Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
461
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
Get full text
Get full text
Get full text
Get full text
article -
462
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015“…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
Get full text
Get full text
masterThesis -
463
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
464
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
465
Optimizing ADWIN for Steady Streams
Published 2022“…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
Get full text
Get full text
Get full text
-
466
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
Published 2022“…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
-
467
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
Get full text
-
468
High-order parametrization of the hypergeometric-Meijer approximants
Published 2023“…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …”
-
469
Recovery of business intelligence systems
Published 2018“…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
470
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
471
-
472
A forward-backward Kalman for the estimation of time-variant channels in OFDM
Published 2005“…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
Get full text
Get full text
article -
473
Shuffled Linear Regression with Erroneous Observations
Published 2019“…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
474
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
Get full text
Get full text
Get full text
-
475
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
Get full text
-
476
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
477
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article -
478
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
479
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …”
-
480
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”