Search Results - (( using function method algorithm ) OR ( based information data algorithm ))
Search alternatives:
- based information »
- method algorithm »
- information data »
- function method »
- using function »
- data algorithm »
-
1
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
Get full text
Get full text
Get full text
Thesis -
2
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
3
Pashto language stemming algorithm
Published 2015“…Furthermore, the accuracy and strength of the proposed algorithm is evaluated using word count method. To validate the function of the developed algorithm, two native speakers of Pashto were recruited to evaluate the algorithm in terms of its accuracy and strength. …”
Get full text
Get full text
Get full text
Article -
4
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Input Information in the Approximate Calculation of Two-Dimensional Integral from Highly Oscillating Functions (Irregular Case)
Published 2019“…Current stage of research in astronomy, radiology, computed tomography, holography, and radar is characterized by broad use of digital technologies, algorithms, and methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
7
MRI segmentation of medical images using FCM with initialized class centers via genetic algorithm
Published 2008“…In this method, the centre is obtained by minimizing an object Function. …”
Get full text
Get full text
Conference or Workshop Item -
8
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
Get full text
Get full text
Get full text
Thesis -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
11
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
12
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
13
Bayesian inference for the bivariate extreme model
Published 2016“…Maximum likelihood method and a Markov chain Monte Carlo (MCMC) technique, Multiple-try Metropolis algorithm are implemented into the data analysis. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Evaluation of Search Result of Document Search Based GA (DSEGA)
Published 2004“…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Computational Technique for an Efficient Classification of Protein Sequences With Distance-Based Sequence Encoding Algorithm
Published 2017“…The accurate classification of protein sequence would be helpful in determining the structure and function of novel protein sequences. In this article, we have proposed a distance-based sequence encoding algorithm that captures the sequence's statistical characteristics along with amino acids sequence order information. …”
Get full text
Get full text
Article -
17
Discovering decision algorithm from a distance relay event report
Published 2009“…In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. The method of discovering the distance relay decision algorithm essentially involved formulating rough set discernibility matrix and function from relay event report, finding reducts of pertinent attributes using genetic algorithm and finally generating relay prediction rules. …”
Get full text
Get full text
Get full text
Article -
18
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
19
Arabic text classification using hybrid feature selection method using chi-square binary artificial bee colony algorithm
Published 2021“…After that, the wrapper method, Artificial Bee Colony algorithm, is used as the second level where Naive Base is used as a fitness function. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
