Search alternatives:
using algorithm » cosine algorithm (Expand Search)
finding » findings (Expand Search)
element » elements (Expand Search)
Showing 41 - 60 results of 805 for search '(((( based finding algorithm ) OR ( data using algorithm ))) OR ( element network algorithm ))', query time: 0.12s Refine Results
  1. 41

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  2. 42
  3. 43
  4. 44
  5. 45

    A comparison of data mapping algorithms for parallel iterative PDE solvers by Mansour, Nashat

    Published 1995
    “…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  6. 46

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 47

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain by Al Sadawi, Alia

    Published 2021
    “…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
    Get full text
    article
  8. 48

    DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data by Assaf, Ali

    Published 2022
    “…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 49
  10. 50
  11. 51
  12. 52

    A Parallel Neural Networks Algorithm for the Clique Partitioning Problem by Harmanani, Haidar M.

    Published 2002
    “…The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …”
    Get full text
    Get full text
    article
  13. 53

    Scalable Nonparametric Supervised Learning for Streaming and Massive Data: Applications in Healthcare Monitoring and Credit Risk by Mohamed Chaouch (17983846)

    Published 2025
    “…Additionally, an online classifier is developed for streaming data, combining online PCA with a kernel-based recursive classifier using a stochastic approximation algorithm. …”
  14. 54

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  15. 55
  16. 56
  17. 57

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 58

    A matrix-based damage assessment and recovery algorithm by Haraty, Ramzi A.

    Published 2014
    “…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 59
  20. 60