Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
-
81
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
Get full text
Get full text
Get full text
Get full text
article -
82
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
Get full text
article -
83
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
Published 2022“…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
Get full text
Get full text
Get full text
masterThesis -
84
Selection of the learning gain matrix of an iterative learning control algorithm in presence of measurement noise
Published 2005“…This work also provides a recursive algorithm that generates the appropriate learning gain functions that meet the arbitrary high precision output tracking objective. …”
Get full text
Get full text
Get full text
Get full text
article -
85
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
86
-
87
-
88
-
89
-
90
-
91
-
92
Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels
Published 2023“…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …”
-
93
-
94
Artificial intelligence-based methods for fusion of electronic health records and imaging data
Published 2022“…The most important question when using multimodal data is how to fuse them—a field of growing interest among researchers. …”
-
95
A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation
Published 2023“…Also, to evaluate the robustness of the algorithms, we test the neural network, without retraining it, on multiple scenarios with noisier data and bad data. …”
Get full text
Get full text
Get full text
masterThesis -
96
Optimal selection of the forgetting matrix into an iterative learning control algorithm
Published 2005“…A recursive optimal algorithm, based on minimizing the input error covariance matrix, is derived to generate the optimal forgetting matrix and the learning gain matrix of a P-type iterative learning control (ILC) for linear discrete-time varying systems with arbitrary relative degree. …”
Get full text
Get full text
Get full text
Get full text
article -
97
Optimum Partition of Power Networks Using Singular Value Decomposition and Affinity Propagation
Published 2024Subjects: -
98
Deep learning-based user experience evaluation in distance learning
Published 2023“…More than 160,000 tweets, addressing conditions related to the major change in the education system, were gathered from Twitter social network and deep learning-based sentiment analysis models and topic models based on latent dirichlet allocation (LDA) algorithm were developed and analyzed. …”
-
99
An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting
Published 2021“…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
-
100
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
Published 2021“…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …”