Search alternatives:
experimental data » experimental _ (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 101 - 120 results of 198 for search '(( data mining algorithm ) OR ((( experimental data algorithm ) OR ( elements data algorithm ))))', query time: 0.14s Refine Results
  1. 101

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…”
  2. 102

    A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization by Yamout, Youssef

    Published 2021
    “…We examine several heuristic algorithms in an attempt to achieve these two main objectives and conduct a thorough experimental analysis providing evidence of the effectiveness of our graph mapping approach. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 103

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…A corresponding graph realization approach is introduced based on a reduction to the Weighted Edge Cover problem, which in turn is solved using Integer Linear Programming to obtain the best possible solution. Our thorough experimental studies provide empirical evidence of the effectiveness of the new approach; by specifically showing that the introduced anonymization algorithm has a negligible effect on the way nodes are clustered, thereby preserving valuable network information while significantly improving the data privacy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 104
  5. 105

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  6. 106
  7. 107
  8. 108

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  9. 109

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
    Get full text
  10. 110

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems by Khaled Dhibi (16891524)

    Published 2023
    “…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
  16. 116

    A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities by Muhammad Mazhar Rathore (17051745)

    Published 2021
    “…In this paper, we proposed a transport-control model that exploits cyber-physical systems (CPS) and sensor-technology to continuously monitor and mine the big city data for smart decision-making. …”
  17. 117

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
    Get full text
  18. 118

    Video features with impact on user quality of experience by Abbas, Nadine

    Published 2021
    “…After collecting the QoE assessments, the supervised training data set is developed and imported into Rapid-Miner data mining tool. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 119

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…In this work we will justify the proposed Localization scheme analytically and provide numerical and experimental data to substantiate our methodology.…”
    Get full text
    Get full text
    masterThesis
  20. 120

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article