Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
task algorithm » jaya algorithm (Expand Search)
data making » data mining (Expand Search)
Showing 61 - 80 results of 701 for search '(((( data using algorithm ) OR ( data making algorithm ))) OR ( movement task algorithm ))', query time: 0.12s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 66

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  7. 67

    Automatic keyword extraction from a real estate classifieds data set by Devassy, Dibin

    Published 2011
    “…With the increasing amount of information, it also becomes an area of interest on how to make online search easier. Keywords are considered to be a solution to this problem and are now widely used to search the information over the internet.In this project we analyze a real estate classifieds data set, with an objective to find keywords that represent this data set. …”
    Get full text
  8. 68

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
  9. 69
  10. 70

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 71
  12. 72

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands by Peng, Wang

    Published 2020
    “…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
    Get full text
    Get full text
    Get full text
    article
  13. 73

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. …”
  14. 74
  15. 75
  16. 76
  17. 77

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
  18. 78

    Capturing outline of fonts using genetic algorithm and splines by Sarfraz, M.

    Published 2001
    “…Some examples are given to show the results obtained from the algorithm…”
    Get full text
    Get full text
    article
  19. 79
  20. 80

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”