Search alternatives:
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
finding » findings (Expand Search)
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
finding » findings (Expand Search)
-
141
Data Redundancy Management in Connected Environments
Published 2020“…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
142
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
-
143
-
144
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
145
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
Published 2023“…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
-
146
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
Published 2023“…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …”
-
147
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
-
148
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
149
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
150
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…”
Get full text
article -
151
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
Published 2023“…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …”
-
152
-
153
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
Get full text
-
154
-
155
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
156
-
157
The Role of KM in Enhancing AI Algorithms and Systems
Published 2020“…The review looks into 16 studies collected from a different database from 2014 to 2019. The main finding of the research was the massive impact of some KM processes like knowledge acquisition and knowledge creation on the different types of AI systems and algorithms to give an additional option for organizations during the implementation. …”
Get full text
Get full text
-
158
-
159
Parallel genetic algorithm for disease-gene association
Published 2011“…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
160
Particle swarm optimization algorithm: review and applications
Published 2024“…This paper surveys the published papers in PSO algorithms. Twenty research papers are analyzed and classified according to the implementation area used by the PSO algorithm (neural networks, feature selection, and data clustering). …”
Get full text