Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
-
1
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
2
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
3
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
Published 2016“…A Master of Science thesis in Engineering Systems Management by Alia Al Sadawi entitled, "Efficient Dynamic Cost Scheduling Algorithm for Data Batch Process," submitted in May 2016. …”
Get full text
doctoralThesis -
4
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…An iterative dynamic scheduling algorithm (DCSDBP) was developed to address the data batching process. …”
Get full text
article -
5
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Subjects: “…Genetic algorithms -- Data processing…”
Get full text
Get full text
masterThesis -
6
On the steiner walk problem. (c2009)
Published 2009Subjects: “…Euclidean algorithm -- Data processing…”
Get full text
Get full text
masterThesis -
7
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
8
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
9
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
-
10
-
11
-
12
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…Unfortunately, PCA’s reliability drops when data has nonlinear characteristics as industrial processes. …”
-
13
A genetic algorithm for corrective retesting. (c1995)
Published 1995Subjects: Get full text
Get full text
masterThesis -
14
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”
-
15
-
16
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
Published 2022Subjects: Get full text
Get full text
Get full text
masterThesis -
17
-
18
The effects of data balancing approaches: A case study
Published 2023“…Our results showed that the replacement method was effective, and LogisticRegression combined with the oversampling algorithms SMOTE or ADASYN, GaussianProcessClassifier with the oversampling algorithm SMOTE, and LinearDiscriminantAnalysis were the best performing models after log transformation of the dataset was followed by Recursive Feature Elimination.…”
-
19
Three-phase approach for curriculum-based course timetabling problem. (c2012)
Published 2012Subjects: “…Scheduling -- Data processing…”
Get full text
Get full text
masterThesis -
20