Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 61 - 80 results of 355 for search '(((( elements method algorithm ) OR ( present data algorithm ))) OR ( text processing algorithm ))', query time: 0.13s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 65

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…The authors present robust stability bounds for sampled data systems. …”
    Get full text
    article
  6. 66

    Robust control of sampled data systems by Al-Sunni, F.M.

    Published 1998
    “…The authors present robust stability bounds for sampled data systems. …”
    Get full text
    Get full text
    article
  7. 67

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…The authors present robust stability bounds for sampled data systems. …”
    Get full text
    article
  8. 68

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…The authors present robust stability bounds for sampled data systems. …”
    Get full text
    article
  9. 69

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  10. 70

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
  11. 71
  12. 72

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 73

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
  14. 74

    Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation by Attieh, Joseph

    Published 2024
    “…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 75

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  16. 76

    Graph Contraction for Mapping Data on Parallel Computers by Mansour, N.

    Published 1994
    “…The mapping solution for the original problem is obtained by a straightforward interpolation. We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …”
    Get full text
    Get full text
    Get full text
    article
  17. 77

    Mapping realistic data sets on parallel computers by Mansour, N.

    Published 1993
    “…The authors propose reducing the problem size by a mapping-oriented graph contraction technique. They present a graph contraction (GC) heuristic algorithm that yields a smaller representation of the problem, to which mapping is then applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 78

    Scatter Search algorithm for Protein Structure Prediction by Mansour, Nashat

    Published 2016
    “…In this paper, we present a Scatter Search (SS) algorithm for predicting 3D structures of proteins based on torsion angles representation. …”
    Get full text
    Get full text
    Get full text
    article
  19. 79

    Parallel genetic algorithm for disease-gene association by Mansour, Nashat

    Published 2011
    “…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 80

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…In the first part, we employ NLP techniques and machine learning algorithms to extract and analyze tweets containing keywords related to loneliness. …”