Showing 121 - 140 results of 202 for search '(( relevant data algorithm ) OR ((( present finding algorithm ) OR ( level coding algorithm ))))', query time: 0.19s Refine Results
  1. 121

    An Extension Of Rahim And Banerjee'S Model For A Process With Upper And Lower Specification Limits by Al-Sultan, Khalid

    Published 2020
    “…We use Hooke and Jeeves search algorithm to optimize the model, and provide a numerical example.…”
    Get full text
    article
  2. 122
  3. 123
  4. 124

    Performance Prediction Using Classification by MOOLIYIL, GITA

    Published 2019
    “…Principal component analysis and feature selection by weights using information gain ratio, Gini index, correlation and PCA is used to determine the relevant predictors of the datasets used. This study also addresses gaps in the current available literature on performance prediction, such as data imbalance and the use of Ensemble models. …”
    Get full text
  5. 125

    Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol by Santiago Hors-Fraile (5950823)

    Published 2018
    “…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
  6. 126
  7. 127

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
  8. 128

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS by Tekli, Joe

    Published 2018
    “…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 129

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  10. 130

    The maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…In the maximum common subgraph (MCS) problem, we are given a pair of graphs and asked to find the largest induced subgraph common to them both. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 131

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…The execution time of the recovery process is a crucial factor for measuring the performance because it is directly proportional to the denial of service time of any healthcare system. This paper presents a high performance damage assessment and recovery algorithm for e-healthcare systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 132

    SDODV. (c2018) by Assi, Maram

    Published 2018
    “…Therefore, the routing problem designated to find and maintain an optimal route between two nodes is not very straight forward. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 133
  14. 134

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…This paper presents a simulated annealing algorithm in order to solve the nonpreemptive open-shop scheduling problem with the objective of minimizing the makespan. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 135

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
  16. 136

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…The graph-based methods are one of the most important approaches for finding OLs in OSNs. Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  17. 137
  18. 138

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
  19. 139

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  20. 140

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”