Search alternatives:
processing algorithm » processing algorithms (Expand Search)
pass algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
pass algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
-
181
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
-
182
-
183
Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection
Published 2019“…Therefore, to solve this problem and enhance the spatial and frequency diversity orders of large amplify and forward cooperative communication networks, in this paper, we develop three multiple relay selection and distributed beamforming techniques that exploit sparse signal recovery theory to process the subcarriers using the low complexity orthogonal matching pursuit algorithm (OMP). …”
-
184
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
Published 2021“…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …”
Get full text
Get full text
-
185
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…Various descriptive, diagnostic, predictive, and prescriptive analysis is done on the e-procurement data. The deep learning model developed can perform thousands of routine and, repetitive tasks within a fairly short period compared to what it would take for a human being without any compromise on the quality of work. …”
Get full text
-
186
Cuckoo search for portfolio optimization. (c2014)
Published 2014Get full text
Get full text
masterThesis -
187
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
-
188
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
189
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
190
-
191
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
192
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
193
-
194
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
195
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
Get full text
-
196
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
-
197
-
198
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …”
-
199
-
200
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
Get full text