Search alternatives:
boosting algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
boosting algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
81
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
82
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
83
-
84
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019Get full text
Get full text
Get full text
masterThesis -
85
Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm?
Published 2021“…The resulting model achieves an 89% predictive accuracy using historical data. A unique aspect of the model is the incorporation of self-competence, where the model defers when it cannot reasonably make a recommendation. …”
-
86
Prediction of EV Charging Behavior Using Machine Learning
Published 2021“…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
Get full text
article -
87
-
88
Scalable parallel algorithms for dynamic programming on tree decomposition. (c2017)
Published 2017Get full text
Get full text
Get full text
masterThesis -
89
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…Therefore, big data analytics field emerged to tame the generated big data, and use it to provide useful insights to the world. …”
Get full text
-
90
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
Get full text
Get full text
-
91
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
Get full text
-
92
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
-
93
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
94
-
95
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
96
-
97
-
98
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
99
-
100