Search alternatives:
processing algorithm » processing algorithms (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
relating » regulating (Expand Search), relations (Expand Search), relative (Expand Search)
processing algorithm » processing algorithms (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
relating » regulating (Expand Search), relations (Expand Search), relative (Expand Search)
-
141
Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions
Published 2017“…This paper reviews testing procedures, data analysis, updated algorithms used for joint detection, and discusses the latest round of testing in samples with simulated joints at various angles along the borehole.…”
Get full text
Get full text
Get full text
conferenceObject -
142
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
Get full text
article -
143
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
-
144
-
145
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. The efficient boundary of the PSO algorithm was higher than that of the ICA algorithm, and it displayed more efficient portfolios.Therefore, this algorithm was more successful in optimizing the portfolio.…”
-
146
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
147
-
148
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…Educational Data Mining (EDM) is the process of discovering information and relationships from educational data for better understanding of students’ performance, and characteristics of their education providers. …”
Get full text
-
149
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
Published 2023“…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …”
Get full text
-
150
-
151
FarmTech: Regulating the use of digital technologies in the agricultural sector
Published 2023“…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
-
152
Haplotype inference by pure-parsimony using revamped delayed haplotype selection. (c2011)
Published 2011Get full text
Get full text
masterThesis -
153
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
Published 2017“…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
Get full text
-
154
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …”
-
155
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
Get full text
-
156
Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications
Published 2023“…This review introduces set of related works of GBO where distributed into; GBO variants, GBO applications, and evaluate the efficiency of GBO compared with other metaheuristic algorithms. …”
Get full text
-
157
Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection
Published 2024“…Although Evolutionary Algorithms (EAs) have shown promise in the literature for feature selection, creating EAs for high dimensions is still challenging. …”
-
158
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
159
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …”
-
160
Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels
Published 2023“…<p dir="ltr">Although the effect of hyperparameters on algorithmic outputs is well known in machine learning, the effects of hyperparameters on information systems that produce user or customer segments are relatively unexplored. …”