Search alternatives:
lacking algorithm » learning algorithms (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
lacking algorithm » learning algorithms (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
61
Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications
Published 2023“…The review paper will be helpful for the researchers and practitioners of GBO belonging to a wide range of audiences from the domains of optimization, engineering, medical, data mining and clustering. As well, it is wealthy in research on health, environment and public safety. …”
Get full text
-
62
-
63
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
-
64
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.</p><h2>Other Information</h2> <p> Published in: Data Mining and Knowledge Discovery<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1007/s10618-020-00708-6" target="_blank">http://dx.doi.org/10.1007/s10618-020-00708-6</a></p>…”
-
65
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
66
-
67
Correlation Clustering with Overlaps
Published 2020“…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
68
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
-
69
A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation
Published 2023“…Also, to evaluate the robustness of the algorithms, we test the neural network, without retraining it, on multiple scenarios with noisier data and bad data. …”
Get full text
Get full text
Get full text
masterThesis -
70
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…In this paper, we proposed a transport-control model that exploits cyber-physical systems (CPS) and sensor-technology to continuously monitor and mine the big city data for smart decision-making. …”
-
71
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…The data were distributed for training (35%), testing (35%), and validation (30%) of the prediction model.…”
-
72
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
73
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
74
Video features with impact on user quality of experience
Published 2021“…We conduct experimental measurements and record videos with different frame rate, video resolution, transmission data rate, packet loss, delay and codec types. After collecting the QoE assessments, the supervised training data set is developed and imported into Rapid-Miner data mining tool. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
76
Plant disease detection using drones in precision agriculture
Published 2023“…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
-
77
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…”
Get full text
Get full text
Get full text
Get full text
article -
78
RFID localization using single reader antenna. (c2014)
Published 2016“…In this work we will justify the proposed Localization scheme analytically and provide numerical and experimental data to substantiate our methodology.…”
Get full text
Get full text
masterThesis -
79
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
80
Dataset built for Arabic Sentiment Analysis
Published 2016“…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
Get full text