Search alternatives:
using algorithm » cosine algorithm (Expand Search)
pelt algorithm » deer algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 301 - 320 results of 692 for search '(( data using algorithm ) OR ((( develop pelt algorithm ) OR ( relevant data algorithm ))))', query time: 0.13s Refine Results
  1. 301

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…Further, no indication is given of how close the trace is to termination—a highly relevant measure in a streaming setting. This paper introduces a novel approximate streaming conformance checking algorithm that enriches prefix-alignments with confidence and completeness measures. …”
    Get full text
    Get full text
    Get full text
  2. 302

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…As the approximation coefficients represent a smooth low-resolution version of the input data they are only quantized using a uniform scalar quantizer (USQ). …”
    Get full text
    article
  3. 303
  4. 304

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  5. 305

    Using Social Network Analysis to Study Business Partnerships by KARIM, ROLA RASHAD ARIF ABDUL

    Published 2018
    “…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …”
    Get full text
  6. 306

    Using machine learning to support students’ academic decisions by ALLAH, AISHA QASIM GHAZAL FATEH

    Published 2019
    “…At enrollment, this work predicts a student’s GPA in different majors using enrollment data such as high school average, placement test results, and IELTS score. …”
    Get full text
  7. 307
  8. 308
  9. 309

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …”
  10. 310
  11. 311

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
  12. 312

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text
  13. 313
  14. 314
  15. 315
  16. 316

    Soft Sensor for NOx Emission using Dynamical Neural Network by Shakil, M.

    Published 2020
    “…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …”
    Get full text
    article
  17. 317
  18. 318

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
    Get full text
    article
  19. 319

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis
  20. 320

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”