يعرض 1 - 4 نتائج من 4 نتيجة بحث عن '(((( test processing algorithm ) OR ( data modeling algorithm ))) OR ( relevant data algorithm ))~', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…The proposed algorithm has been tested on three tank system pilot plant and Ain El Kebira Cement rotary kiln process. …"
  2. 2

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments حسب Raun, Kristo

    منشور في 2023
    "…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  3. 3

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS حسب Tekli, Joe

    منشور في 2018
    "…To do so, we design and construct a semantic-aware inverted index structure called SemIndex, extending the standard inverted index by constructing a tightly coupled inverted index graph that combines two main resources: a semantic network and a standard inverted index on a collection of textual data. We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Among other methodologies, the CSOM has the unique characteristics of increased searching efficiency, high convergence, and fast processing speed. During the evaluation, the different types of cyber-threat datasets are considered for testing and validation, and the results are compared with the recent state-of-the-art model approaches.…"