يعرض 1 - 20 نتائج من 140 نتيجة بحث عن '(((( elements network algorithm ) OR ( recent data algorithm ))) OR ( implement mining algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications حسب Daoud, Mohammad Sh.

    منشور في 2023
    "…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
    احصل على النص الكامل
  3. 3

    Development of an Optimization Algorithm for Internet Data Traffic حسب Misbahuddin, Syed

    منشور في 2020
    "…In recent era of Information Technology the data traffic over the Internet is increasing uncontrollably. …"
    احصل على النص الكامل
    article
  4. 4

    A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS حسب Youssef, H.

    منشور في 2020
    "…In this paper, we present a Simulated Evolution algorithm for the design of campus network topology. …"
    احصل على النص الكامل
    article
  5. 5

    A Parallel Neural Networks Algorithm for the Clique Partitioning Problem حسب Harmanani, Haidar M.

    منشور في 2002
    "…The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …"
    احصل على النص الكامل
  7. 7

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  8. 8
  9. 9

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm حسب Youssef, H.

    منشور في 2020
    "…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …"
    احصل على النص الكامل
    article
  10. 10

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm حسب Youssef, H.

    منشور في 2020
    "…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …"
    احصل على النص الكامل
    article
  11. 11

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  12. 12

    Predicting Dropouts among a Homogeneous Population using a Data Mining Approach حسب BILQUISE, GHAZALA

    منشور في 2019
    "…While there are several theoretical perspectives of retention, which study the factors that cause students to drop out, more recent studies rely on a data mining and machine learning approach to explore the problem of retention. …"
    احصل على النص الكامل
  13. 13
  14. 14

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network حسب Mohammad Reza Chalak Qazani (13893261)

    منشور في 2024
    "…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
  15. 15
  16. 16
  17. 17
  18. 18

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining حسب Koen Schaaf (14778139)

    منشور في 2021
    "…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
  19. 19

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE حسب SHWEDEH, FATEN

    منشور في 2018
    "…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
    احصل على النص الكامل
  20. 20