Search alternatives:
making algorithm » cosine algorithm (Expand Search)
forest algorithm » firefly algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
forest algorithm » firefly algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
41
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
42
A hybrid heuristic approach to optimize rule based software quality estimation models. (c2008)
Published 2008Get full text
Get full text
masterThesis -
43
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
44
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
45
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
Get full text
Get full text
-
46
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
Get full text
Get full text
Get full text
Get full text
article -
47
Automatic keyword extraction from a real estate classifieds data set
Published 2011“…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …”
Get full text
-
48
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
49
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. …”
-
50
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
51
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
52
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
53
-
54
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
Published 2020“…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
Get full text
Get full text
Get full text
article -
55
-
56
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
Published 2025“…This work identifies the most reliable machine learning (ML) strategies for forecasting corrosion inhibitor efficiency before synthesis, thereby shortening development cycles and reducing experimental cost. Drawing on more than fifteen harmonized datasets that span pyrimidines, ionic liquids, graphene oxides, and additional compound families, we benchmark traditional algorithms, such as artificial neural networks, support vector machines, k-nearest neighbors, random forests, against advanced graph-based and deep architectures including three-level directed message-passing neural networks, 2D3DMol-CIC, and graph convolutional networks. …”
-
57
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
58
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
-
59
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
Published 2016“…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
Get full text
Get full text
Get full text
Get full text
article -
60
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
Get full text
article