Search alternatives:
using algorithm » cosine algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
level using » level fusion (Expand Search)
Showing 121 - 140 results of 374 for search '(((( elements cc3d algorithm ) OR ( experiments using algorithm ))) OR ( level using algorithm ))', query time: 0.15s Refine Results
  1. 121
  2. 122
  3. 123

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output by Kaif Ahmed Lodi (16855518)

    Published 2020
    “…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
  4. 124
  5. 125

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
  6. 126

    Arabic Hotel Reviews Sentiment Analysis Using Deep Learning by ALMANSOORI, MOHAMMAD

    Published 2023
    “…Our models utilized advanced text preprocessing, feature extraction, and classification algorithms to accurately predict sentiment polarity in Arabic hotel reviews. …”
    Get full text
  7. 127

    A Graph Heuristic Approach for the Data Path Allocation Problem by Makhoul, Racha

    Published 2022
    “…To optimize this allocation problem, a variation of the Fiduccia-Mattheyses (FM) algorithm is presented. The algorithm starts with a schedule as input and partitions it into available hardware resources using a modifi ed version of the Fiduccia-Mattheyses algorithm to t the datapath allocation problem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 128
  9. 129

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  10. 130

    Predicting the Release of Chemotherapeutics From the Core of Polymeric Micelles Using Ultrasound by Abdel-Hafez, Mamoun

    Published 2015
    “…Finally, the optimal release estimate is obtained by probabilistically adding the estimates from the hypothesized Kalman filter estimates. The proposed algorithms are first tested using a simulation environment. …”
    Get full text
    article
  11. 131

    Internal Model Control Structure Using Adaptive Inverse Control Strategy by Shafiq, M.Riyaz

    Published 2003
    “…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …”
    Get full text
    Get full text
    article
  12. 132

    Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review by Zainab Jan (17306614)

    Published 2023
    “…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. …”
  13. 133

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…A number of combined algorithms and classifiers are proposed to use in this solution based on the encouraging outcomes observed from the systematic literature review and experts’ survey, including Local Binary Pattern descriptor, Haar-Like Descriptor, Ada Boost, Cascade classifiers, Affine Transformation, Histogram Equalization, Gaussian Filter, Principal Component Analysis which are embedded in OpenCV or MATLAB application. …”
    Get full text
  14. 134

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. The usability of the proposed framework is evaluated using the System Usability Scale (SUS) resulting in overall high acceptability levels across all users. …”
    Get full text
  15. 135

    A clustering metaheuristic for large orienteering problems by Almiqdad Elzein (13141038)

    Published 2022
    “…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
  16. 136
  17. 137

    Joint distributed synchronization and positioning in UWB ad hoc networks using TOA by Denis, B.

    Published 2006
    “…Finally, the proposed distributed maximum log-likelihood algorithm proves to preserve a reasonable level of complexity in each node by approximating asynchronously the positive gradient direction of the log-likelihood function. …”
    Get full text
    Get full text
    Get full text
    article
  18. 138

    Mixed precision iterative refinement with adaptive precision sparse approximate inverse preconditioning by Noaman Khan (19810050)

    Published 2025
    “…We call this algorithm variant BSPAI-GMRES-IR. We then analyze the conditions for the convergence of BSPAI-GMRES-IR, and determine settings under which BSPAI-GMRES-IR will produce similar backward and forward errors as the existing SPAI-GMRES-IR method, the latter of which does not use adaptive precision in preconditioning. …”
  19. 139
  20. 140

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai by Hamadeh, Moutaz Wajih

    Published 2015
    “…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
    Get full text