Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 1 - 20 results of 140 for search '(((( elements network algorithm ) OR ( recent data algorithm ))) OR ( implement mining algorithm ))', query time: 0.13s Refine Results
  1. 1
  2. 2

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
    Get full text
  3. 3

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…In recent era of Information Technology the data traffic over the Internet is increasing uncontrollably. …”
    Get full text
    article
  4. 4

    A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS by Youssef, H.

    Published 2020
    “…In this paper, we present a Simulated Evolution algorithm for the design of campus network topology. …”
    Get full text
    article
  5. 5

    A Parallel Neural Networks Algorithm for the Clique Partitioning Problem by Harmanani, Haidar M.

    Published 2002
    “…The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …”
    Get full text
    Get full text
    article
  6. 6

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
    Get full text
  7. 7

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
    Get full text
  8. 8
  9. 9

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
    Get full text
    article
  10. 10

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
    Get full text
    article
  11. 11

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  12. 12

    Predicting Dropouts among a Homogeneous Population using a Data Mining Approach by BILQUISE, GHAZALA

    Published 2019
    “…While there are several theoretical perspectives of retention, which study the factors that cause students to drop out, more recent studies rely on a data mining and machine learning approach to explore the problem of retention. …”
    Get full text
  13. 13
  14. 14

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  15. 15
  16. 16
  17. 17
  18. 18

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  19. 19

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  20. 20