Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 401 - 420 results of 906 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( based testing algorithm ))))', query time: 0.14s Refine Results
  1. 401

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
  2. 402
  3. 403

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
  4. 404

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …”
    Get full text
    Get full text
    masterThesis
  5. 405
  6. 406

    Optimal scheduling algorithm for residential building distributed energy source systems using Levy flight and chaos-assisted artificial rabbits optimizer by D., Sathish Kumar

    Published 2023
    “…The execution time of the proposed LFCARO is less than 1 sec. for 10 numerical problems and less than 1.5 sec. for the resource scheduling of residential distribution systems. Based on the average Friedman’s ranking test values, the proposed algorithm stands first with 1.82 for numerical and real-world scheduling problems.…”
    Get full text
    Get full text
    Get full text
    article
  7. 407

    Optimal scheduling algorithm for residential building distributed energy source systems using Levy flight and chaos-assisted artificial rabbits optimizer by M. Premkumar (12757280)

    Published 2023
    “…The execution time of the proposed LFCARO is less than 1 sec. for 10 numerical problems and less than 1.5 sec. for the resource scheduling of residential distribution systems. Based on the average Friedman’s ranking test values, the proposed algorithm stands first with 1.82 for numerical and real-world scheduling problems. …”
  8. 408

    Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels by Bernard J. Jansen (7434779)

    Published 2023
    “…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …”
  9. 409
  10. 410

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”
  11. 411

    Creating and detecting fake reviews of online products by Joni Salminen (7434770)

    Published 2022
    “…We show that a machine classifier can accomplish this goal near-perfectly, whereas human raters exhibit significantly lower accuracy and agreement than the tested algorithms. The model was also effective on detected human generated fake reviews. …”
  12. 412
  13. 413

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
    Get full text
    article
  14. 414

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…The dataset was assembled under the Creative Commons Attribution 4.0 International license, using previously anonymized and de-identified images to maintain ethical standards. …”
  15. 415

    A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization by Yamout, Youssef

    Published 2021
    “…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 416

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our thorough experimental studies provide empirical evidence of the effectiveness of the new approach; by specifically showing that the introduced anonymization algorithm has a negligible effect on the way nodes are clustered, thereby preserving valuable network information while significantly improving the data privacy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 417
  18. 418
  19. 419
  20. 420