Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
81
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
Published 2022“…The research study is performed as experimental analysis and develop models from nine machine learning algorithms including KNN, Naïve Bayes, SVM, Logistic regression, Decision Tree, Random forest, Adaboost, Bagging Classifier, and voting Classifier. …”
Get full text
-
82
-
83
Diabetic Sensorimotor Polyneuropathy Severity Classification Using Adaptive Neuro Fuzzy Inference System
Published 2021“…The model accuracy was validated with the results from different machine learning algorithms. The Accuracy, sensitivity, and specificity of the ANFIS model are 91.17±1.18%, 92±2.26%, 96.72±0.93%, respectively. …”
-
84
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…We provide a general keyword query model allowing the user to choose the results’ semantic coverage and expressiveness based on her needs. …”
Get full text
Get full text
Get full text
Get full text
article -
85
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
86
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
87
Iterative Least Squares Functional Networks Classifier
Published 2007“…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …”
Get full text
Get full text
article -
88
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
89
Predicting stability of classes in an object-oriented system
Published 2010“…We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…”
Get full text
Get full text
Get full text
article -
90
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
91
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
Get full text
Get full text
article -
92
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
93
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
Published 2022“…We categorized the studies based on AI techniques, such as machine learning and deep learning. The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …”
-
94
SDODV. (c2018)
Published 2018“…This protocol is based on the distributed reinforcement learning approach and on the traditional AODV. SDODV improves the quality of service because its chooses the shortest and the more stable path and it considers mobility, bandwidth and the power of the devices as well. …”
Get full text
Get full text
Get full text
masterThesis -
95
-
96
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
Get full text
Get full text
Get full text
Get full text
article -
97
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…Nowadays, a lot of people targeting social networks to learn what are the trending topics and the news alongside the huge flow of texts posted daily in social networks. …”
Get full text
-
98
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
99
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
100
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article