Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
Showing 341 - 360 results of 892 for search '(((( developing based algorithm ) OR ( element rd algorithm ))) OR ( data using algorithm ))', query time: 0.12s Refine Results
  1. 341
  2. 342

    Performance Prediction Using Classification by MOOLIYIL, GITA

    Published 2019
    “…The use of classification as a data mining approach for performance prediction has been studied by many eminent researchers. …”
    Get full text
  3. 343

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
  4. 344

    Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar by Sankaran, Rajendran

    Published 2022
    “…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …”
    Get full text
    Get full text
    Get full text
    article
  5. 345
  6. 346

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  7. 347

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …”
    Get full text
    Get full text
    masterThesis
  8. 348
  9. 349

    Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels by Bernard J. Jansen (7434779)

    Published 2023
    “…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …”
  10. 350
  11. 351
  12. 352

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
    Get full text
    article
  13. 353
  14. 354

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…The dataset was assembled under the Creative Commons Attribution 4.0 International license, using previously anonymized and de-identified images to maintain ethical standards. …”
  15. 355
  16. 356

    A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization by Yamout, Youssef

    Published 2021
    “…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 357

    Indoor Localization Based on Floor Plans and Power Maps by Khalifeh, Joe J.

    Published 2015
    “…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 358

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our thorough experimental studies provide empirical evidence of the effectiveness of the new approach; by specifically showing that the introduced anonymization algorithm has a negligible effect on the way nodes are clustered, thereby preserving valuable network information while significantly improving the data privacy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 359
  20. 360