Search alternatives:
using algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
using algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
-
461
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
462
-
463
A forward-backward Kalman for the estimation of time-variant channels in OFDM
Published 2005“…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
Get full text
Get full text
article -
464
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
465
Shuffled Linear Regression with Erroneous Observations
Published 2019“…Existing methods are either applicable only to data with limited observation errors, work only for partially shuffled data, sensitive to initialization, and/or work only with small dimensions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
466
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
Get full text
Get full text
Get full text
-
467
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
Get full text
-
468
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
469
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article -
470
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
471
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …”
-
472
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
473
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …”
Get full text
article -
474
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
-
475
Positive Unlabelled Learning to Recognize Dishes as Named Entity
Published 2019“…I work with Yelp dataset, going through each text review, using each noun as a candidate, label the positive samples using the aforementioned lookup table, then using Positive Unlabelled learning techniques to recognise more entities within the unlabelled data, by predicting the probability for each candidate. …”
Get full text
-
476
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
Published 2020“…Three years of data are used for model building and validation. …”
Get full text
article -
477
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
-
478
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
479
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
480