بدائل البحث:
sharing algorithm » learning algorithms (توسيع البحث), search algorithm (توسيع البحث), swarm algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data sharing » data hiding (توسيع البحث)
sharing algorithm » learning algorithms (توسيع البحث), search algorithm (توسيع البحث), swarm algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data sharing » data hiding (توسيع البحث)
-
1
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
منشور في 2016"…In a data sharing system in a cloud computing environment, such as health care system, peers or data sources execute transactions on-the-fly in response to user queries without any centralized control. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
2
A neural networks algorithm for data path synthesis
منشور في 2003"…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
3
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
منشور في 2020"…The improvement of information technology in the past few years has been encouraging the healthcare sector to share medical data online without any barriers and between different parties. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
4
-
5
-
6
Topics in graph algorithms
منشور في 2003"…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
7
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
احصل على النص الكامل
-
8
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
منشور في 2020"…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …"
احصل على النص الكامل
-
9
Allocation and re-allocation of data in a grid using an adaptive genetic algorithm
منشور في 2006"…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
-
11
Data Redundancy Management in Connected Environments
منشور في 2020"…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
-
13
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021"…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
14
-
15
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …"
احصل على النص الكامل
-
16
Particle swarm optimization algorithm: review and applications
منشور في 2024"…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…"
احصل على النص الكامل
-
17
-
18
Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar
منشور في 2022"…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Using Machine Learning Algorithms to Forecast Solar Energy Power Output
منشور في 2025"…We focused on the first 30-min, 3-h, 6-h, 12-h, and 24-h windows to gain an appreciation of the impact of forecasting duration on the accuracy of prediction using the selected machine learning algorithms. The study results show that Random Forest outperformed all other tested algorithms. …"
-
20
Limiting the Collection of Ground Truth Data for Land Use and Land Cover Maps with Machine Learning Algorithms
منشور في 2022"…This was accomplished by (1) extracting reliable LULC information from Sentinel-2 and Landsat-8 s images, (2) generating remote sensing indices used to train ML algorithms, and (3) comparing the results with ground truth data. …"