Showing 1 - 11 results of 11 for search '(( primary data processing optimization algorithm ) OR ( binary a process detection algorithm ))', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…ML based informal diagnostic and decision support systems can provide a first line of detection to alert patients about potential disease risk. …”
    Get full text
  4. 4

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  5. 5
  6. 6

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. Therefore, this process can be seen as an optimization process. The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. …”
    Get full text
  7. 7

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO by Majedeh Gheytanzadeh (17541927)

    Published 2022
    “…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …”
  8. 8

    Deep and transfer learning for building occupancy detection: A review and comparative analysis by Aya Nabil Sayed (17317006)

    Published 2022
    “…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …”
  9. 9

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…The first solution is proposed based on integrating the existing surveillance camera systems with the recommended “Banking Payment Context- Account Based Ticketing System” to offer face recognition access entry to the passenger inside metro station. A number of combined algorithms and classifiers are proposed to use in this solution based on the encouraging outcomes observed from the systematic literature review and experts’ survey, including Local Binary Pattern descriptor, Haar-Like Descriptor, Ada Boost, Cascade classifiers, Affine Transformation, Histogram Equalization, Gaussian Filter, Principal Component Analysis which are embedded in OpenCV or MATLAB application. …”
    Get full text
  10. 10

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 11

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”