Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
-
321
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
Published 2020“…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
-
322
-
323
-
324
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
-
325
Stability improvement of the PSS-connected power system network with ensemble machine learning tool
Published 2022“…The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
-
326
Neural network-based failure rate prediction for De Havilland Dash-8 tires
Published 2006Get full text
article -
327
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
328
Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility
Published 2019“…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
329
A 3-D vision-based man-machine interface for hand-controlled telerobot
Published 2005“…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
Get full text
Get full text
article -
330
A new bi-objective model of the urban public transportation hub network design under uncertainty
Published 2019“…For medium and large-sized problems, a meta-heuristic algorithm, namely multi-objective particle swarm optimization is applied and its performance is compared with results from the non-dominated sorting genetic algorithm. …”
-
331
A PLC based power factor controller for a 3-phase induction motor
Published 2000“…This work focuses on the implementation of a laboratory model for a PLC based PFC to improve the power factor of a three-phase induction motor. …”
Get full text
Get full text
article -
332
Correlation Clustering with Overlaps
Published 2020“…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
333
Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends
Published 2024“…The k-fold cross-validation technique is used for model training, and the developed neural network-based model is used to investigate the effects of operating parameters on the premixed turbulent flames. …”
-
334
-
335
Minimizing using BBO and DFO methods
Published 2022“…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. To solve nonlinear differential equations we use Runge-Kutta method of fourth order, and for the minimization part, we use two different methods, namely Nelder-Mead and Model Based Descent methods. …”
Get full text
Get full text
Get full text
masterThesis -
336
-
337
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
338
Boosting the visibility of services in microservice architecture
Published 2023“…We utilized parameter optimization techniques, namely Grid Search, Random Search, Bayes Search, Halvin Grid Search, and Halvin Random Search to fine-tune the hyperparameters of our classifier models. Experimental results demonstrated that the CatBoost algorithm achieved the highest level of accuracy (90.42%) in predicting microservice quality.…”
-
339
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
340