Search alternatives:
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elementi rd » elementi per (Expand Search)
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elementi rd » elementi per (Expand Search)
-
161
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
-
162
Detection of statistically significant network changes in complex biological networks
Published 2017“…In addition, its application highlights several novel candidates that cannot be detected by standard single network-based approaches.…”
-
163
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007article -
164
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007Get full text
article -
165
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
166
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
167
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. The approach is validated on stability of classes in object-oriented software systems and can easily be used for any other software quality characteristic. …”
Get full text
Get full text
Get full text
article -
168
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
169
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
170
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
171
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…An integrated web application is developed to mock up the end-to-end process in ecommerce. Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
172
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
173
-
174
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007Get full text
Get full text
conferenceObject -
175
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
176
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
Published 2000“…Therefore, a simplified decoding algorithm is proposed. It is based on symbol-by-symbol detection of the Q/I components in the I/Q decoders. …”
Get full text
Get full text
article -
177
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
Get full text
-
178
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
179
-
180
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
Get full text
Get full text
Get full text
Get full text
article