Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
-
341
Using machine learning for disease detection. (c2013)
Published 2016Get full text
Get full text
masterThesis -
342
Cutting‐edge technologies for detecting and controlling fish diseases: Current status, outlook, and challenges
Published 2024“…Here, we highlighted the potential of machine learning algorithms in early pathogen detection and the possibilities of intelligent aquaculture in controlling disease outbreaks at the farm level. …”
-
343
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
344
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
345
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …”
-
346
Diagnosing failed distribution transformers using neural networks
Published 2001“…The ANN was trained utilizing backpropagation algorithm using a real (out of the field) data obtained from utilities distribution networks transformer's failures. …”
Get full text
Get full text
article -
347
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
348
Plant disease detection using drones in precision agriculture
Published 2023“…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
-
349
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text
-
350
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
351
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Furthermore, data collection platforms and related modules for data transmission, data storage and privacy concerns used in different datasets are also analyzed and compared. …”
-
352
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
Published 2025“…A key requirement in these applications is minimizing the latency of data processing, particularly for time-sensitive tasks like image classification of IIoT device data. …”
-
353
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…As the approximation coefficients represent a smooth low-resolution version of the input data they are only quantized using a uniform scalar quantizer (USQ). …”
Get full text
article -
354
-
355
Using Social Network Analysis to Study Business Partnerships
Published 2018“…The resulting weighted undirected network is analysed using community detection algorithms. Characteristics of the top seven communities discovered from the 2015 data are discussed for which common social network motifs are captured. …”
Get full text
-
356
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …”
Get full text
article -
357
Using machine learning to support students’ academic decisions
Published 2019“…At enrollment, this work predicts a student’s GPA in different majors using enrollment data such as high school average, placement test results, and IELTS score. …”
Get full text
-
358
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
359
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
360
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis