Showing 421 - 440 results of 799 for search '(((( based finding algorithm ) OR ( data using algorithm ))) OR ( element data algorithm ))', query time: 0.17s Refine Results
  1. 421

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  2. 422
  3. 423

    Using artificial intelligence to improve body iron quantification: A scoping review by Abdulqadir J. Nashwan (11659453)

    Published 2023
    “…The search revealed a wide range of machine learning algorithms used by different studies. Notably, most studies used a single data type. …”
  4. 424

    Label dependency modeling in Multi-Label Naïve Bayes through input space expansion by PKA Chitra (21749216)

    Published 2024
    “…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. …”
  5. 425

    A New Approach for Recognizing Saudi Arabian License Plates using Neural Networks by Deriche, Mohamed

    Published 2020
    “…Finally, a Multilayer Feedforward Neural Network (MFNN) with a backpropagation (BP) algorithm is used for character recognition. We discuss new features from the characters for training the NN. …”
    Get full text
    article
  6. 426
  7. 427
  8. 428

    Modelling surface currents in the Eastern Levantine Mediterranean using surface drifters and satellite altimetry by Issa, Leila

    Published 2016
    “…We present a new and fast method that blends altimetric and drifter positions data in order to predict the surface velocity in the Eastern Levantine Mediterranean. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 429

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  10. 430
  11. 431

    Sentiment Analysis of the Emirati Dialect text using Ensemble Stacking Deep Learning Models by AL SHAMSI, ARWA AHMED

    Published 2023
    “…For the basic machine learning algorithms, LR, NB, SVM, RF, DT, MLP, AdaBoost, GBoost, and an ensemble model of machine learning classifiers were used. …”
    Get full text
  12. 432

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
  13. 433
  14. 434

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  15. 435
  16. 436

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
    Get full text
    Get full text
    masterThesis
  17. 437

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  18. 438
  19. 439
  20. 440

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text