Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 341 - 360 results of 441 for search '(( data mining algorithm ) OR ((( develop based algorithm ) OR ( elements data algorithm ))))*', query time: 0.12s Refine Results
  1. 341

    Diagnosing failed distribution transformers using neural networks by Farag, A.S.

    Published 2001
    “…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. …”
    Get full text
    Get full text
    article
  2. 342

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs by Kouatli, Issam

    Published 2008
    “…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 343
  4. 344
  5. 345

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 346

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 347

    Digital Image Watermarking Using Balanced Multiwavelets by Ghouti, L.

    Published 2006
    “…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
    Get full text
    article
  8. 348

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
  9. 349
  10. 350

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…To accomplish such a feat, four user-specific methods were developed, implemented, and tested; all of which were based on a benchmark database created by the authors. …”
  11. 351
  12. 352
  13. 353

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  14. 354
  15. 355
  16. 356

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…An overview of its applications can inform the scientific community and facilitate further developments. In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …”
  17. 357

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”
  18. 358

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…An original MHFE-based formulation of the two-phase flow model is taken as a reference for the development of the BCPR preconditioner, in which the set of system unknowns comprises both element and face pressures, in addition to the cell saturations, resulting in a $$3\times 3$$ 3 × 3 block-structured Jacobian matrix with a $$2\times 2$$ 2 × 2 inner pressure problem. …”
  19. 359
  20. 360

    Computer-aided detection of Melanoma using geometric features by Azar, Danielle

    Published 2017
    “…The k-Nearest Neighbors (k-NN) machine learning algorithm is used to classify 15 lesions based on their ABD features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject