Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
post algorithm » cosine algorithm (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 331 for search '(((( develop post algorithm ) OR ( element research algorithm ))) OR ( data processing algorithm ))', query time: 0.11s Refine Results
  1. 141

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  2. 142

    Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering by Saadia Jamil (22045946)

    Published 2024
    “…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
  3. 143
  4. 144

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  5. 145

    Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System by Abu Zitar, Raed

    Published 2021
    “…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …”
    Get full text
    Get full text
  6. 146

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  7. 147

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  8. 148
  9. 149
  10. 150
  11. 151

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
    Get full text
    Get full text
    Get full text
  12. 152

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  13. 153

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
  14. 154

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
    Get full text
  15. 155

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  16. 156

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
  17. 157
  18. 158
  19. 159

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …”
  20. 160

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
    Get full text