Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
21
-
22
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022Subjects: -
23
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
Get full text
Get full text
Get full text
masterThesis -
24
Improved search-tree algorithms for the cluster edit problem. (c2011)
Published 2011Get full text
Get full text
masterThesis -
25
-
26
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
-
27
-
28
A SIMULATED ANNEALING ALGORITHM FOR THE CLUSTERING PROBLEM
Published 2020“…In this paper we discuss the solution of the clustering problem usually solved by the K-means algorithm. …”
Get full text
article -
29
NEW ALGORITHMS FOR SOLVING THE FUZZY CLUSTERING PROBLEM
Published 2020“…Two new algorithms for fuzzy clustering are presented. Convergence of the proposed algorithms is proved. …”
Get full text
article -
30
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
31
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…During this process, the input patterns are categorized into different clusters. Using the Bayesian information criterion, the similarity measure is employed to evaluate the similarity between the patterns and cluster weight. …”
-
32
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …”
-
33
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
34
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…A cluster node is connected in each clustered region and provides the central control center with the necessary data. …”
-
35
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
Get full text
-
36
-
37
Allocation and re-allocation of data in a grid using an adaptive genetic algorithm
Published 2006“…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
38
Stochastic Search Algorithms for Exam Scheduling
Published 2007“…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
Get full text
Get full text
article -
39
Data Redundancy Management in Connected Environments
Published 2020“…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
40