Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
Showing 201 - 220 results of 512 for search '(((( develop based algorithms ) OR ( element method algorithm ))) OR ( data making algorithm ))', query time: 0.14s Refine Results
  1. 201
  2. 202

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 203

    Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter by Saleh Alhazbi (16869960)

    Published 2020
    “…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
  4. 204

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
  5. 205
  6. 206

    A combinatorial auction‐based approach for ridesharing in a student transportation system by Chefi Triki (14158860)

    Published 2023
    “…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …”
  7. 207

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
  8. 208
  9. 209

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  10. 210

    Analysis of power system stability enhancement via excitation and FACTS-based stabilizers by Abido, M. A.

    Published 2004
    “…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …”
    Get full text
    article
  11. 211
  12. 212

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 213

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …”
  14. 214

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
  15. 215

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  16. 216
  17. 217

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents by Muhammad E. H. Chowdhury (14150526)

    Published 2019
    “…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
  18. 218
  19. 219

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important issue in cybercrime. …”
  20. 220

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”