Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 101 - 120 results of 756 for search '(( elements method algorithm ) OR ((( data including algorithm ) OR ( data using algorithm ))))', query time: 0.13s Refine Results
  1. 101
  2. 102

    Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks by Kalash, Saeddin

    Published 2025
    “…We then decompose the problem into two sub-problems where wepropose real-time approaches including (1) data redundancy avoidance and VoI evaluation, and (2) dynamic UAV deployment and position adaptation. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 103

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…To improve the effectiveness and efficiency of the UniBFS algorithm, Redundant Features Elimination algorithm (RFE) is presented in this paper. …”
  4. 104
  5. 105

    Capturing outline of fonts using genetic algorithm and splines by Sarfraz, M.

    Published 2001
    “…Some examples are given to show the results obtained from the algorithm…”
    Get full text
    Get full text
    article
  6. 106
  7. 107

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…A total of eleven hundred experimental data points for nine FPs (two stratified and seven dispersed patterns) in horizontal wellbores are used to develop the MLs. …”
  8. 108
  9. 109
  10. 110

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY by Noras, J.M.

    Published 2020
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …”
    Get full text
    article
  11. 111

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 112

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  13. 113

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization by Chintalapani, Gouthami

    Published 2016
    “…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 114

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions by Liu, Wenpeng

    Published 2017
    “…This paper reviews testing procedures, data analysis, updated algorithms used for joint detection, and discusses the latest round of testing in samples with simulated joints at various angles along the borehole.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 115

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  16. 116
  17. 117
  18. 118
  19. 119

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 120

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”