Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 1 - 20 results of 843 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( from processing algorithms ))))', query time: 0.16s Refine Results
  1. 1

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology by Jaber, Mohammad

    Published 2020
    “…Numerous damage assessment and recovery algorithms have been proposed in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 2

    DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data by Assaf, Ali

    Published 2022
    “…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    “…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …”
    Get full text
    Get full text
    Get full text
  9. 9
  10. 10

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 11

    A Novel Non-Invasive Estimation of Respiration Rate From Motion Corrupted Photoplethysmograph Signal Using Machine Learning Model by Md. Nazmul Islam Shuzan (16888827)

    Published 2021
    “…Gaussian Process Regression (GPR) with Fit a Gaussian process regression model (Fitrgp) feature selection algorithm outperformed all other combinations and exhibits a root mean squared error (RMSE), mean absolute error (MAE), and two-standard deviation (2SD) of 2.63, 1.97, and 5.25 breaths per minute, respectively. …”
  12. 12

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…Pathwidth has many applications ranging from circuit layout to natural language processing. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 13

    Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence by Al Rayhi, Nasser

    Published 2020
    “…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
    Get full text
  14. 14

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  15. 15

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…Sentiment Analysis is one application of big data analysis when dealing with text data. Sentiment Analysis refers to the processes of extracting and analysing emotions from a given text to classify its polarity, mainly within three classes; positive, negative and neutral. …”
    Get full text
  16. 16

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  17. 17

    Allocation and re-allocation of data in a grid using an adaptive genetic algorithm by Mansour, N.

    Published 2006
    “…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 18

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  19. 19
  20. 20