Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
-
21
-
22
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
Published 2023“…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …”
Get full text
-
23
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…Data-driven decision-making has become increasingly widespread and relevant across all business areas, including private and public sectors. …”
Get full text
-
24
Distributed dimension reduction algorithms for widely dispersed data
Published 2002“…It is well known that information retrieval, clustering and visualization can often be improved by reducing the dimensionality of high dimensional data. …”
Get full text
Get full text
Get full text
conferenceObject -
25
-
26
-
27
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…<p dir="ltr">Clustering has proved to be a successful classification method when it comes to dealing with multiview data. …”
-
28
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
29
General applicability of genetic and simulated annealing algorithms for data mapping
Published 1995“…We experimentally analyze the general applicability of genetic algorithms (GA) and simulated annealing algorithms (SA) for mapping data to multicomputers. …”
Get full text
Get full text
Get full text
conferenceObject -
30
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …”
Get full text
Get full text
Get full text
article -
31
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
Published 2016Get full text
doctoralThesis -
32
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
-
33
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
34
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
35
-
36
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…A cluster node is connected in each clustered region and provides the central control center with the necessary data. …”
-
37
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Our problem definition aims at clustering the sensors, constructing an optimized forwarding tree per cluster, and gathering the data from selected cluster head nodes based on projection-based CDG with minimized UAV trajectory distance. …”
Get full text
Get full text
Get full text
Get full text
article -
38
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022Subjects: -
39
-
40
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…Then, for each pattern, various weak clusters are constructed via X‐means clustering and are utilized as the weak learner (clusters). …”