Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithms » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
Showing 601 - 620 results of 728 for search '(((( data using algorithms ) OR ( image processing algorithm ))) OR ( elements mining algorithm ))', query time: 0.13s Refine Results
  1. 601

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
  2. 602

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes by Radhakrishnan Vishnubalaji (3563306)

    Published 2023
    “…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
  3. 603

    A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education by Abu Zitar, Raed

    Published 2022
    “…Facial recognition algorithms extract helpful information from online platforms as image classification techniques are applied to detect the emotions of student and/or teacher faces. …”
    Get full text
  4. 604

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  5. 605
  6. 606
  7. 607
  8. 608

    Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications by Abdallah Falah Mohammad Aldwekat (22457821)

    Published 2025
    “…</p><h3>Materials and methods</h3><p dir="ltr">An ensemble<u> species distribution modelling </u>approach, integrating regression-based and machine-learning algorithms (GLM, GBM, RF, MaxEnt), was used to project habitat suitability (Current time and by 2050, 2070, and 2090). …”
  9. 609

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this research, 143 research papers have been used for analysis which are providing security solutions towards IoT security issues. …”
  10. 610
  11. 611

    Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration by Al-Yamani, A.

    Published 0000
    “…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …”
    Get full text
    Get full text
    article
  12. 612

    Positive Unlabelled Learning to Recognize Dishes as Named Entity by TAREK, AIMAN

    Published 2019
    “…I work with Yelp dataset, going through each text review, using each noun as a candidate, label the positive samples using the aforementioned lookup table, then using Positive Unlabelled learning techniques to recognise more entities within the unlabelled data, by predicting the probability for each candidate. …”
    Get full text
  13. 613

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  14. 614

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study by Alaa Abd-alrazaq (17058018)

    Published 2024
    “…</p><h3>Objective</h3><p dir="ltr">In this paper, we propose a machine learning–based approach for identifying research gaps through the analysis of scientific literature. We used the COVID-19 pandemic as a case study.</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …”
  15. 615

    Graph contraction for physical optimization methods by Mansour, Nashat

    Published 1993
    “…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 616

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
  17. 617

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  18. 618

    Video features with impact on user quality of experience by Abbas, Nadine

    Published 2021
    “…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 619

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  20. 620

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
    Get full text
    Get full text
    Get full text