Search alternatives:
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
201
-
202
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
203
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
Published 2020“…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
-
204
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
-
205
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
Published 2025Get full text
doctoralThesis -
206
A combinatorial auction‐based approach for ridesharing in a student transportation system
Published 2023“…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …”
-
207
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
208
-
209
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
210
Analysis of power system stability enhancement via excitation and FACTS-based stabilizers
Published 2004“…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …”
Get full text
article -
211
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
212
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
213
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …”
-
214
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
-
215
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
216
-
217
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
Published 2019“…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
-
218
-
219
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important issue in cybercrime. …”
-
220
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”