Search Results - (( rate estimation method algorithm ) OR ( user identification search algorithm ))
Search alternatives:
- identification search »
- user identification »
- estimation method »
- method algorithm »
- rate estimation »
-
1
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The simulation results show the effectiveness of the ARDE method over other conventional techniques, transcending the limits of the existing state-of-the-art algorithms in estimating the parameters of robot. …”
Get full text
Get full text
Thesis -
2
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
Get full text
Get full text
Conference or Workshop Item -
3
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
4
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
Article -
5
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
6
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
7
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
8
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…However, due to information overload, some search engines are still incapable of returning only the most relevant documents to the users. …”
Get full text
Get full text
Get full text
Thesis -
9
COMPARATIVE ANALYSIS OF OPTICAL FLOW MEASUREMENT TECHNIQUE
Published 2017“…At that time, there was no accurate method to estimate the flow rate of the hydrocarbon leakage. …”
Get full text
Get full text
Final Year Project -
10
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
Get full text
Get full text
Article -
11
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013Get full text
Get full text
Get full text
Citation Index Journal -
12
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item -
13
Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data
Published 2011“…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
Get full text
Get full text
Thesis -
14
An improved framework for content-based spamdexing detection
Published 2020“…This article is an attempt in that direction, where a framework has been proposed for spam web pages identification. The framework uses Stop words, Keywords Density, Spam Keywords Database, Part of Speech (POS) ratio, and Copied Content algorithms. …”
Get full text
Get full text
Get full text
Article -
15
-
16
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Fast adaptive motion estimation search algorithm for H.264 encoder
Published 2012“…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
Get full text
Get full text
Thesis -
18
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
19
A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems
Published 2021“…Some of the most popular methods used in cellular communication for channel estimation are the Least Squares (LS) algorithm and the Minimum Mean Square Error (MMSE) algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Turnbull versus Kaplan-Meier estimators of cure rate estimation using interval censored data
Published 2012“…Thus, the non-parametric estimation methods are employed by means of the EM algorithm. …”
Get full text
Get full text
Get full text
Article
