يعرض 1 - 20 نتائج من 105 نتيجة بحث عن '(((( develop box algorithm ) OR ( relevant data algorithm ))) OR ( data mining algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1

    Auto-indexing Arabic texts based on association rule data mining. (c2015) حسب Rouba G. Nasrallah

    منشور في 2015
    "…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 2
  3. 3

    Indexing Arabic texts using association rule data mining حسب Haraty, Ramzi A.

    منشور في 2019
    "…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…<p>Feature selection (FS) is a crucial technique in machine learning and data mining, serving a variety of purposes such as simplifying model construction, facilitating knowledge discovery, improving computational efficiency, and reducing memory consumption. …"
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  12. 12
  13. 13
  14. 14

    Towards Scalable Process Mining Pipelines حسب Mohamed, Belal

    منشور في 2023
    "…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  15. 15

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  16. 16

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
    احصل على النص الكامل
  17. 17

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  18. 18
  19. 19
  20. 20

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining حسب Alqaryouti, Omar

    منشور في 2021
    "…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
    احصل على النص الكامل