Search alternatives:
using algorithm » cosine algorithm (Expand Search)
pelt algorithm » deer algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
pelt algorithm » deer algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
301
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…Further, no indication is given of how close the trace is to termination—a highly relevant measure in a streaming setting. This paper introduces a novel approximate streaming conformance checking algorithm that enriches prefix-alignments with confidence and completeness measures. …”
Get full text
Get full text
Get full text
-
302
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…As the approximation coefficients represent a smooth low-resolution version of the input data they are only quantized using a uniform scalar quantizer (USQ). …”
Get full text
article -
303
-
304
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
305
Using Social Network Analysis to Study Business Partnerships
Published 2018“…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …”
Get full text
-
306
Using machine learning to support students’ academic decisions
Published 2019“…At enrollment, this work predicts a student’s GPA in different majors using enrollment data such as high school average, placement test results, and IELTS score. …”
Get full text
-
307
-
308
-
309
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …”
-
310
-
311
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
312
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
Get full text
-
313
-
314
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
315
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
316
Soft Sensor for NOx Emission using Dynamical Neural Network
Published 2020“…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …”
Get full text
article -
317
-
318
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
Get full text
article -
319
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis -
320
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”