Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data finding » data hiding (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data finding » data hiding (Expand Search)
element » elements (Expand Search)
-
121
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
Get full text
-
122
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
Published 2025“…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
-
123
-
124
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. …”
Get full text
Get full text
Get full text
masterThesis -
125
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…In the second part, interactive visualizations are developed to present the findings in an engaging and intuitive manner. Techniques such as tree maps and radar plots are utilized to transform the analyzed data into visually appealing representations.…”
-
126
-
127
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…In this paper, we proposed a transport-control model that exploits cyber-physical systems (CPS) and sensor-technology to continuously monitor and mine the big city data for smart decision-making. …”
-
128
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
Published 2024“…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …”
-
129
A Survey of Machine Learning Innovations in Ambulance Services: Allocation, Routing, and Demand Estimation
Published 2024“…<p dir="ltr">In the realm of Emergency Medical Services (EMS), the integration of Machine Learning (ML) techniques has emerged as a catalyst for revolutionizing ambulance operations. ML algorithms could play a pivotal role in dynamically allocating resources, devising efficient routes, and predicting demand patterns. …”
-
130
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
131
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
Get full text
-
132
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…Online conformance checking deals with finding discrepancies be tween real-life and modeled behavior on data streams. …”
Get full text
Get full text
Get full text
-
133
Corona power loss computation in bundled bipolar conductors
Published 2000“…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
Get full text
Get full text
article -
134
Video features with impact on user quality of experience
Published 2021“…We conduct experimental measurements and record videos with different frame rate, video resolution, transmission data rate, packet loss, delay and codec types. After collecting the QoE assessments, the supervised training data set is developed and imported into Rapid-Miner data mining tool. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
135
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
Get full text
Get full text
article -
136
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…In this paper, an enhanced binary version of the Rat Swarm Optimizer (RSO) is proposed to deal with Feature Selection (FS) problems. FS is an important data reduction step in data mining which finds the most representative features from the entire data. …”
-
137
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
138
-
139
-
140
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article