Search alternatives:
lacking algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
lacking algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
41
-
42
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
Get full text
Get full text
masterThesis -
43
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
Published 2015Get full text
doctoralThesis -
44
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …”
-
45
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
-
46
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
Get full text
article -
47
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
48
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …”
Get full text
Get full text
Get full text
article -
49
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
Get full text
Get full text
article -
50
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
51
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
52
Identification of physically based models of residential air-conditioners for direct load control management
Published 2004“…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …”
Get full text
Get full text
article -
53
Correlation Clustering with Overlaps
Published 2020“…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
54
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
-
55
Weather Sensitivity Of Physically Based Model Of Residential Air-Conditioners For Direct Load Control: A Case Study
Published 2020“…An online maximum likelihood based-identification algorithm is developed. The required hardware and system instrumentation are detailed. …”
Get full text
article -
56
Weather Sensitivity Of Physically Based Model Of Residential Air-Conditioners For Direct Load Control: A Case Study
Published 2020“…An online maximum likelihood based-identification algorithm is developed.The required hardware and system instrumentation are detailed. …”
Get full text
article -
57
Identification And Weather Sensitivity Of Physically Based Model Of Residential Air-Conditioners For Direct Load Control: A Case Study
Published 2020“…An online maximum likelihood based-identification algorithm is developed. The required hardware and system instrumentation are detailed. …”
Get full text
article -
58
A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation
Published 2023“…Also, to evaluate the robustness of the algorithms, we test the neural network, without retraining it, on multiple scenarios with noisier data and bad data. …”
Get full text
Get full text
Get full text
masterThesis -
59
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
60