Search alternatives:
making algorithm » cosine algorithm (Expand Search)
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data making » data mining (Expand Search)
making algorithm » cosine algorithm (Expand Search)
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data making » data mining (Expand Search)
-
61
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
Get full text
article -
62
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
63
-
64
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
-
65
-
66
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …”
-
67
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …”
-
68
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …”
Get full text
Get full text
masterThesis -
69
Large-scale annotation dataset for fetal head biometry in ultrasound images
Published 2023“…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
-
70
A parallel ant colony optimization to globally optimize area in high-level synthesis. (c2011)
Published 2011Get full text
Get full text
masterThesis -
71
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
72
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data has not been investigated to the extent that such analysis can support decision-making or revenue/budget forecasting. …”
Get full text
-
73
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…Our experimental results on four benchmark datasets conclusively demonstrate that the proposed algorithm makes accurate recommendations in item cold-start settings compared to the state-of-the-art algorithms according to commonly used ranking metrics like Normalized Discounted Cumulative Gain (NDCG) and Mean Average Precision (MAP). …”
-
74
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
75
-
76
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
77
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. Various search engines, like Google Scholar, Semantic Scholar, Web of Science etc. …”
-
78
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
79
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
Published 2019“…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
-
80
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important issue in cybercrime. …”