Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 61 - 80 results of 727 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( data existing algorithm ))))', query time: 0.14s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…This motivates the utilization of unmanned aerial vehicles (UAVs) to offload traffic from existing wireless networks by collecting data from time-constrained IoT devices with performance guarantees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 65

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  6. 66

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 67

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 68

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  9. 69

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
  10. 70
  11. 71

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 72
  13. 73
  14. 74

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 75

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  16. 76
  17. 77
  18. 78

    Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment by Farhat Mahmood (15468854)

    Published 2023
    “…Therefore, this study proposes a comprehensive data-driven robust model predictive control framework for greenhouse temperature control and its energy utilisation assessment in the presence of uncertainties. …”
  19. 79

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) by Wehbe, Gioia Wahib

    Published 2016
    “…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …”
    Get full text
    Get full text
    masterThesis
  20. 80