Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
tools using » tool using (Expand Search)
element » elements (Expand Search)
Showing 101 - 120 results of 223 for search '(((( data mining algorithm ) OR ( tools using algorithm ))) OR ( element method algorithm ))', query time: 0.12s Refine Results
  1. 101

    Platoon Transitional Maneuver Control System: A Review by Sareh Badnava (16891374)

    Published 2021
    “…The most recent articles on platoon control maneuvers have been analyzed based on the proposed control algorithm, homogeneously or heterogeneously of platoon members, type of platoon maneuver, the aim of control problem, type of implementation, and used simulation tools. …”
  2. 102
  3. 103

    Can AI Help in Screening Viral and COVID-19 Pneumonia? by Muhammad E. H. Chowdhury (14150526)

    Published 2020
    “…The main clinical tool currently in use for the diagnosis of COVID-19 is the Reverse transcription polymerase chain reaction (RT-PCR), which is expensive, less-sensitive and requires specialized medical personnel. …”
  4. 104
  5. 105

    Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques by Abu Zitar, Raed

    Published 2022
    “…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
    Get full text
  6. 106

    Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers by Hamidreza Besharatifard (16904823)

    Published 2022
    “…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
  7. 107
  8. 108

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
  9. 109

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.</p><h2>Other Information</h2> <p> Published in: Data Mining and Knowledge Discovery<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1007/s10618-020-00708-6" target="_blank">http://dx.doi.org/10.1007/s10618-020-00708-6</a></p>…”
  10. 110

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…After reviewing the mechanism of GFT, a sample application to measure the CRM performance analysis was used as a vehicle to demonstrate the technique. A generic tool termed as Fuzzy Inference Engine (FIE) was built to demonstrate the multivariable modular approach used to implement the CRM performance measurement.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 111
  12. 112

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
  13. 113

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 114

    A system for sign language recognition using fuzzy object similarity tracking by Sarfraz, M.

    Published 2005
    “…In this paper, we have presented a system that performs vision based isolated Arabic sign language recognition using hidden Markov models together with EM algorithm for parameters estimation. …”
    Get full text
    Get full text
    article
  15. 115

    Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning by MEZAHEM, FATEMA HAMAD

    Published 2022
    “…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. In order to label the data that was gathered from a corpus collection for ML use, manual annotation was made. …”
    Get full text
  16. 116
  17. 117
  18. 118

    Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System by Fahmida Haque (16896489)

    Published 2021
    “…The model accuracy was validated with the results from different machine learning algorithms. The Accuracy, sensitivity, and specificity of the ANFIS model are 91.17±1.18%, 92±2.26%, 96.72±0.93%, respectively. …”
  19. 119

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…In order to benefit from multiple different classifiers, and exploit their strengths, the use of ensembling algorithms arises, which combine the results of the individual classifiers into a final result to achieve greater precision and thus a better result. …”
    Get full text
  20. 120

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
    Get full text
    Get full text