Search alternatives:
cscap algorithm » cosine algorithm (Expand Search)
develop » developed (Expand Search)
tree » three (Expand Search), free (Expand Search)
element » elements (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
cscap algorithm » cosine algorithm (Expand Search)
develop » developed (Expand Search)
tree » three (Expand Search), free (Expand Search)
element » elements (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
-
1
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
2
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017“…This new trend has been motivated by hardness of approximation results that appeared in the last decade, and has taken a great boost by the emergence of parameterized complexity theory. Exact algorithms often follow the classical search-tree based recursive backtracking strategy. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
-
4
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. …”
Get full text
Get full text
conferenceObject -
5
-
6
Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr...
Published 2020“…The approach was developed based on random forest (RF), Kernel logistic regression (KLR), and Naive Bayes Tree machine learning algorithms which use multitemporal Landsat images. …”
Get full text
article -
7
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…In the second part, interactive visualizations are developed to present the findings in an engaging and intuitive manner. …”
-
8
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
Published 2022“…The research study is performed as experimental analysis and develop models from nine machine learning algorithms including KNN, Naïve Bayes, SVM, Logistic regression, Decision Tree, Random forest, Adaboost, Bagging Classifier, and voting Classifier. …”
Get full text
-
9
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
10
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…The challenge now is to develop fast and accurate computational methods to analyze this huge amount of data. …”
Get full text
Get full text
masterThesis -
11
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis -
12
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…To perform the experiment, we focused on the field of mathematics and used a dataset containing 525 individuals who received awards and 525 individuals who did not receive awards. The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
-
13
Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces
Published 2021“…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …”
-
14
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
15
A 3-D vision-based man-machine interface for hand-controlled telerobot
Published 2005“…Running the tracking algorithm on two PCs in parallel allowed: 1) a parallel image grabbing delay of 60 ms; 2) a stereo matching delay of 50 ms; and 3) a global refresh rate of 9 Hz.…”
Get full text
Get full text
article -
16
A fine-grained XML structural comparison approach
Published 2007“…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
17
An XML Document Comparison Framework
Published 2001“…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
Get full text
Get full text
Get full text
article -
18
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. …”
-
19
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…The main aim was to predict the initial leukemia disease. Machine learning algorithms such as decision tree (DT), naive bayes (NB), random forest (RF), gradient boosting machine (GBM), linear regression (LinR), support vector machine (SVM), and novel approach based on the combination of Logistic Regression (LR), DT and SVM named as ensemble LDSVM model. …”
-
20
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article