Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
elements rl » elements _ (Expand Search)
experiments » experimental (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
elements rl » elements _ (Expand Search)
experiments » experimental (Expand Search)
-
81
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
Get full text
-
82
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…The lamb wave signals for interrogating the plate structure are obtained using experiments and a sparse array of four piezoelectric wafer (PW) transducers. …”
Get full text
-
83
-
84
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
85
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
86
-
87
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
88
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
Published 2024“…Thus, the shortcomings of wet lab experiments are leveraged by computational methods to accurately predict the functional types of DPs. …”
-
89
-
90
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
91
-
92
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. …”
-
93
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
94
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…All the experiments were conducted using the pitch-catch method in presence of surface damages on head of the Rail track. …”
Get full text
-
95
-
96
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
97
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
Published 2022“…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …”
Get full text
-
98
-
99
A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System
Published 2023“…CEC2019 test suite is also used to perform ablation experiments to reveal the separate contributions of chaotic local search and modified opposition-based learning strategies to the CmOBL-AO algorithm. …”
Get full text
-
100
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
Published 2022“…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …”