Search alternatives:
processing algorithm » processing algorithms (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
element based » event based (Expand Search)
Showing 61 - 80 results of 364 for search '(((( element based algorithm ) OR ( element each algorithm ))) OR ( data processing algorithm ))', query time: 0.12s Refine Results
  1. 61

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Unfortunately, PCA’s reliability drops when data has nonlinear characteristics as industrial processes. …”
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67

    Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018) by Tay, Bilal M.

    Published 2018
    “…Companies, nowadays, rely on systems and applications to automate their business processes and data management. In this context, the notion of integrating machine learning techniques in banking business processes has emerged, where trainable computational algorithms can be improved by learning. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 68
  9. 69

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark by Ameema Zainab (16864263)

    Published 2021
    “…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”