Search Results - (( knowledge internalization learning algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- knowledge internalization »
- internalization learning »
- application matching »
- learning algorithm »
- java application »
-
1
-
2
Adaptive learning for lemmatization in morphology analysis
Published 2014“…Morphological analysis is used to study the internal structure words by reducing the number of vocabularies used while retaining the semantic meaning of the knowledge in NLP system. …”
Get full text
Conference or Workshop Item -
3
-
4
-
5
-
6
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System
Published 2019“…Thus, this paper presents the maximum feature adaptive online sequential extreme learning machine (MFA-OSELM) technique, which uses previous knowledge to handle the cyclic dynamic factors that are brought about by the issue of mobility, which is present in internal environments. …”
Get full text
Get full text
Get full text
Article -
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
MFA-OSELM algorithm for WiFi-based indoor positioning system
Published 2019“…Thus, this paper presents the maximum feature adaptive online sequential extreme learning machine (MFA-OSELM) technique, which uses previous knowledge to handle the cyclic dynamic factors that are brought about by the issue of mobility, which is present in internal environments. …”
Get full text
Get full text
Get full text
Article -
15
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
Get full text
Get full text
Thesis -
20
