Search Results - (( data implication from algorithm ) OR ( data normalization _ algorithm ))
Search alternatives:
- data normalization »
- data implication »
- implication from »
- from algorithm »
-
1
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
2
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…This concept is used to specify the constraints that may exist in the relations and guide the design while removing semantic data redundancies. This approach leads to a good normalized relational schema without data redundancy. …”
Get full text
Get full text
Thesis -
3
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
Get full text
Get full text
Article -
4
Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms
Published 2025“…A comprehensive data preprocessing pipeline was implemented, including missing value treatment, outlier removal, and feature normalization using Min-Max scaling. …”
Get full text
Get full text
Get full text
Article -
5
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Reliability analysis, factor analysis, normality analysis, correlation analysis and regression analysis are used to analyze the amassed data. …”
Get full text
Get full text
Thesis -
6
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Framework for pedestrian walking behaviour recognition to minimize road accident
Published 2021“…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Cognitive load assessment through EEG: a dataset from arithmetic and stroop tasks
Published 2025“…The recordings are categorized into four classes representing varying levels of induced mental stress: normal, low, mid, and high. Each task was performed for a duration of 10–20 s, and three trials were conducted for comprehen- sive data collection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Effect of normalization and effect of normalization and training algorithm on radial basis training algorithm on radial basis function network performance function network performa...
Published 2007“…To recognize the effect of normalization of data and training algorithm on Radial Basis Function (RBF) performance.…”
Get full text
Get full text
Conference or Workshop Item -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
12
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
13
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Pengkelasan Sel Kanser Pangkal Rahim Kepada Sel Normal Dan Tidak Normal Menggunakan Analisis Pembezalayan Dan Rangkaian Neural
Published 2006“…The system is built to classify some certain data into two classes, which are normal or abnormal cells. …”
Get full text
Get full text
Monograph -
15
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…The source data used to get 3D digital models of human soft tissues include CT data and 3D laser scanner data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021“…This research contributes to the world of health, where we classify the Electrocardiogram (ECG) data, so that it can classify abnormal and normal cardiac disorders using the Fuzzy Cognitive Map (FCM) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
17
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Consequently, to handle these data, computer algorithms must adapt to their characteristics. …”
Get full text
Get full text
Thesis -
18
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array
Published 2011“…Locus-specific CN aberrations and LOH were statistically summarized using the binary segmentation algorithm and hidden Markov model. Selected genes from the SNP array analysis were also validated using quantitative real-time PCR. …”
Get full text
Get full text
Article -
20
Reference gene validation for gene expression normalization in canine osteosarcoma: a geNorm algorithm approach
Published 2017“…Previous gene expression studies involving canine OS have used one or two reference genes to normalize gene expression. This study aimed to validate a panel of reference genes commonly used for normalization of canine OS gene expression data using the geNorm algorithm. qPCR analysis of nine canine reference genes was performed on 40 snap-frozen primary OS tumors and seven cell lines. …”
Get full text
Get full text
Get full text
Article
