يعرض 1 - 11 نتائج من 11 نتيجة بحث عن '(( primary data processing optimization algorithm ) OR ( binary a process detection algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... حسب Mohamed, AlShuweihi

    منشور في 2020
    "…ML based informal diagnostic and decision support systems can provide a first line of detection to alert patients about potential disease risk. …"
    احصل على النص الكامل
  4. 4

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
  5. 5
  6. 6

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems حسب Abdel-Salam, Mahmoud

    منشور في 2024
    "…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …"
    احصل على النص الكامل
  7. 7

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …"
  8. 8

    Deep and transfer learning for building occupancy detection: A review and comparative analysis حسب Aya Nabil Sayed (17317006)

    منشور في 2022
    "…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …"
  9. 9

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…The first solution is proposed based on integrating the existing surveillance camera systems with the recommended “Banking Payment Context- Account Based Ticketing System” to offer face recognition access entry to the passenger inside metro station. A number of combined algorithms and classifiers are proposed to use in this solution based on the encouraging outcomes observed from the systematic literature review and experts’ survey, including Local Binary Pattern descriptor, Haar-Like Descriptor, Ada Boost, Cascade classifiers, Affine Transformation, Histogram Equalization, Gaussian Filter, Principal Component Analysis which are embedded in OpenCV or MATLAB application. …"
    احصل على النص الكامل
  10. 10

    Towards Multimedia Fragmentation حسب Saad, Samir

    منشور في 2006
    "…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 11

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"