Search alternatives:
processing algorithm » processing algorithms (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data testing » data using (Expand Search)
Showing 141 - 160 results of 412 for search '(( movement data algorithm ) OR ((( data processing algorithm ) OR ( data testing algorithm ))))', query time: 0.15s Refine Results
  1. 141

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  2. 142

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…Textual data contains much useless information that must be pre-processed. …”
  3. 143
  4. 144

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…The proposed method, named Eye-means, emulates the natural ocular process of estimating initial centroids. To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 145

    Data mining approach to predict student's selection of program majors by SIDDARTHA, SHARMILA

    Published 2019
    “…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
    Get full text
  6. 146
  7. 147
  8. 148
  9. 149
  10. 150

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…The classification technique has the unique feature of cutting down the computation largely by only allowing the event of interest to be executed by a particular algorithm. The set-up was also tested with random signals from a 137Cs test source. …”
    Get full text
    Get full text
    article
  11. 151

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
    Get full text
    Get full text
    Get full text
  12. 152

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…We use an ant colony optimization algorithm in the adaptation process. The approach is validated on stability of classes in object-oriented software systems and can easily be used for any other software quality characteristic. …”
    Get full text
    Get full text
    Get full text
    article
  13. 153
  14. 154
  15. 155

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…An integrated web application is developed to mock up the end-to-end process in ecommerce. Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
    Get full text
  16. 156
  17. 157
  18. 158

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
    Get full text
  19. 159

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  20. 160

    Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test by Hasan T. Abbas (8115014)

    Published 2019
    “…In this paper, we present an automatic tool that uses machine learning techniques to predict the development of type 2 diabetes mellitus (T2DM). Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …”